Build Log (Full)
trunk standard buildnss02 Linux/Fedora17 64bit DBG on 2012/11/27 15:52:11
Show Brief Log
Return to the Build Page
Add a Comment to the Log

Build Comments

[bsmith@mozilla.com - 2012/11/27 18:00:21]
Looks like random orange
caused by DNS server failure

Build Error Summary

Build Error Log


tinderbox: tree: NSS
tinderbox: builddate: 1354060331
tinderbox: status: testfailed
tinderbox: build: trunk standard buildnss02 Linux/Fedora17 64bit DBG
tinderbox: errorparser: unix
tinderbox: buildfamily: unix
tinderbox: END

TB [2012-11-27 18:52:11] ######## Environment variables ########
Linux buildnss02.localdomain 3.6.6-1.fc17.x86_64 #1 SMP Mon Nov 5 21:59:35 UTC 2012 x86_64 x86_64 x86_64 GNU/Linux
Fedora release 17 (Beefy Miracle)
XDG_SESSION_ID=54
HOSTNAME=buildnss02.localdomain
SELINUX_ROLE_REQUESTED=
SHELL=/bin/bash
TERM=screen
HISTSIZE=1000
SSH_CLIENT=10.36.116.85 42490 22
PORT_JSSE_SERVER=8583
PKITS_DATA=/home/tinderbox/pkits/data/
SELINUX_USE_CURRENT_RANGE=
OLDPWD=/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_stable_32_OPT/mozilla/security/jss/org/mozilla/jss/tests
CVS_LIST=mozilla/nsprpub
mozilla/dbm
mozilla/security/dbm
mozilla/security/coreconf
mozilla/security/nss
mozilla/security/jss
-r:NSS_3_11_1_RTM:mozilla/security/nss/lib/freebl/ecl/ecl-curve.h
SSH_TTY=/dev/pts/0
BRANCH=trunk
QT_GRAPHICSSYSTEM_CHECKED=1
USER=tinderbox
LS_COLORS=rs=0:di=01;34:ln=01;36:mh=00:pi=40;33:so=01;35:do=01;35:bd=40;33;01:cd=40;33;01:or=40;31;01:mi=01;05;37;41:su=37;41:sg=30;43:ca=30;41:tw=30;42:ow=34;42:st=37;44:ex=01;32:*.tar=01;31:*.tgz=01;31:*.arj=01;31:*.taz=01;31:*.lzh=01;31:*.lzma=01;31:*.tlz=01;31:*.txz=01;31:*.zip=01;31:*.z=01;31:*.Z=01;31:*.dz=01;31:*.gz=01;31:*.lz=01;31:*.xz=01;31:*.bz2=01;31:*.tbz=01;31:*.tbz2=01;31:*.bz=01;31:*.tz=01;31:*.deb=01;31:*.rpm=01;31:*.jar=01;31:*.war=01;31:*.ear=01;31:*.sar=01;31:*.rar=01;31:*.ace=01;31:*.zoo=01;31:*.cpio=01;31:*.7z=01;31:*.rz=01;31:*.jpg=01;35:*.jpeg=01;35:*.gif=01;35:*.bmp=01;35:*.pbm=01;35:*.pgm=01;35:*.ppm=01;35:*.tga=01;35:*.xbm=01;35:*.xpm=01;35:*.tif=01;35:*.tiff=01;35:*.png=01;35:*.svg=01;35:*.svgz=01;35:*.mng=01;35:*.pcx=01;35:*.mov=01;35:*.mpg=01;35:*.mpeg=01;35:*.m2v=01;35:*.mkv=01;35:*.ogm=01;35:*.mp4=01;35:*.m4v=01;35:*.mp4v=01;35:*.vob=01;35:*.qt=01;35:*.nuv=01;35:*.wmv=01;35:*.asf=01;35:*.rm=01;35:*.rmvb=01;35:*.flc=01;35:*.avi=01;35:*.fli=01;35:*.flv=01;35:*.gl=01;35:*.dl=01;35:*.xcf=01;35:*.xwd=01;35:*.yuv=01;35:*.cgm=01;35:*.emf=01;35:*.axv=01;35:*.anx=01;35:*.ogv=01;35:*.ogx=01;35:*.aac=01;36:*.au=01;36:*.flac=01;36:*.mid=01;36:*.midi=01;36:*.mka=01;36:*.mp3=01;36:*.mpc=01;36:*.ogg=01;36:*.ra=01;36:*.wav=01;36:*.axa=01;36:*.oga=01;36:*.spx=01;36:*.xspf=01;36:*.pdf=00;33:*.ps=00;33:*.ps.gz=00;33:*.txt=00;33:*.patch=00;33:*.diff=00;33:*.log=00;33:*.tex=00;33:*.xls=00;33:*.xlsx=00;33:*.ppt=00;33:*.pptx=00;33:*.rtf=00;33:*.doc=00;33:*.docx=00;33:*.odt=00;33:*.ods=00;33:*.odp=00;33:*.xml=00;33:*.epub=00;33:*.abw=00;33:*.htm=00;33:*.html=00;33:*.shtml=00;33:*.wpd=00;33:
NSS_ECC_MORE_THAN_SUITE_B=1
TERMCAP=SC|screen|VT 100/ANSI X3.64 virtual terminal:\
:DO=\E[%dB:LE=\E[%dD:RI=\E[%dC:UP=\E[%dA:bs:bt=\E[Z:\
:cd=\E[J:ce=\E[K:cl=\E[H\E[J:cm=\E[%i%d;%dH:ct=\E[3g:\
:do=^J:nd=\E[C:pt:rc=\E8:rs=\Ec:sc=\E7:st=\EH:up=\EM:\
:le=^H:bl=^G:cr=^M:it#8:ho=\E[H:nw=\EE:ta=^I:is=\E)0:\
:li#84:co#272:am:xn:xv:LP:sr=\EM:al=\E[L:AL=\E[%dL:\
:cs=\E[%i%d;%dr:dl=\E[M:DL=\E[%dM:dc=\E[P:DC=\E[%dP:\
:im=\E[4h:ei=\E[4l:mi:IC=\E[%d@:ks=\E[?1h\E=:\
:ke=\E[?1l\E>:vi=\E[?25l:ve=\E[34h\E[?25h:vs=\E[34l:\
:ti=\E[?1049h:te=\E[?1049l:us=\E[4m:ue=\E[24m:so=\E[3m:\
:se=\E[23m:mb=\E[5m:md=\E[1m:mr=\E[7m:me=\E[m:ms:\
:Co#8:pa#64:AF=\E[3%dm:AB=\E[4%dm:op=\E[39;49m:AX:\
:vb=\Eg:G0:as=\E(0:ae=\E(B:\
:ac=\140\140aaffggjjkkllmmnnooppqqrrssttuuvvwwxxyyzz{{||}}~~..--++,,hhII00:\
:po=\E[5i:pf=\E[4i:Km=\E[M:k0=\E[10~:k1=\EOP:k2=\EOQ:\
:k3=\EOR:k4=\EOS:k5=\E[15~:k6=\E[17~:k7=\E[18~:\
:k8=\E[19~:k9=\E[20~:k;=\E[21~:F1=\E[23~:F2=\E[24~:\
:F3=\E[1;2P:F4=\E[1;2Q:F5=\E[1;2R:F6=\E[1;2S:\
:F7=\E[15;2~:F8=\E[17;2~:F9=\E[18;2~:FA=\E[19;2~:kb=:\
:K2=\EOE:kB=\E[Z:kF=\E[1;2B:kR=\E[1;2A:*4=\E[3;2~:\
:*7=\E[1;2F:#2=\E[1;2H:#3=\E[2;2~:#4=\E[1;2D:%c=\E[6;2~:\
:%e=\E[5;2~:%i=\E[1;2C:kh=\E[1~:@1=\E[1~:kH=\E[4~:\
:@7=\E[4~:kN=\E[6~:kP=\E[5~:kI=\E[2~:kD=\E[3~:ku=\EOA:\
:kd=\EOB:kr=\EOC:kl=\EOD:km:
PATH=/usr/lib64/ccache:/usr/local/bin:/usr/bin:/usr/local/sbin:/usr/sbin:/home/tinderbox/.local/bin:/home/tinderbox/bin
DOMSUF=usersys.redhat.com
STY=11598.pts-0.buildnss02
NSS_ENABLE_ECC=1
PWD=/home/tinderbox/mozilla/security/tinderlight
JAVA_HOME=/usr/lib/jvm/java-1.6.0-openjdk.x86_64
XMODIFIERS=@im=none
LANG=en_US.UTF-8
QT_GRAPHICSSYSTEM=native
SELINUX_LEVEL_REQUESTED=
HISTCONTROL=ignoredups
HOME=/home/tinderbox
SHLVL=4
NSPR_LOG_MODULES=pkix:1
TB_TREE=NSS
USE_64=1
LOGNAME=tinderbox
CVS_RSH=ssh
WINDOW=0
SSH_CONNECTION=10.36.116.85 42490 10.16.79.157 22
BUILD_OPT=
LESSOPEN=||/usr/bin/lesspipe.sh %s
PORT=8543
XDG_RUNTIME_DIR=/run/user/tinderbox
PORT_JSS_SERVER=8563
CCACHE_HASHDIR=
_=/usr/bin/env
TB [2012-11-27 18:52:11] ######## CVS checkout ########
TB [2012-11-27 18:52:11] $ cd /home/tinderbox/mozilla/security/tinderlight/data/mozilla-cvs-trunk
TB [2012-11-27 18:52:11] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A mozilla/nsprpub
cvs checkout: Updating mozilla/nsprpub
cvs checkout: Updating mozilla/nsprpub/admin
cvs checkout: Updating mozilla/nsprpub/build
cvs checkout: Updating mozilla/nsprpub/build/autoconf
cvs checkout: Updating mozilla/nsprpub/build/win32
cvs checkout: Updating mozilla/nsprpub/config
cvs checkout: Updating mozilla/nsprpub/include
cvs checkout: Updating mozilla/nsprpub/lib
cvs checkout: Updating mozilla/nsprpub/lib/ds
cvs checkout: Updating mozilla/nsprpub/lib/libc
cvs checkout: Updating mozilla/nsprpub/lib/libc/include
cvs checkout: Updating mozilla/nsprpub/lib/libc/src
cvs checkout: Updating mozilla/nsprpub/lib/msgc
cvs checkout: Updating mozilla/nsprpub/lib/msgc/include
cvs checkout: Updating mozilla/nsprpub/lib/msgc/src
cvs checkout: Updating mozilla/nsprpub/lib/msgc/tests
cvs checkout: Updating mozilla/nsprpub/lib/prstreams
cvs checkout: Updating mozilla/nsprpub/lib/prstreams/tests
cvs checkout: Updating mozilla/nsprpub/lib/prstreams/tests/testprstrm
cvs checkout: Updating mozilla/nsprpub/lib/tests
cvs checkout: Updating mozilla/nsprpub/lib/tests/windows
cvs checkout: Updating mozilla/nsprpub/macbuild
cvs checkout: Updating mozilla/nsprpub/pkg
cvs checkout: Updating mozilla/nsprpub/pkg/linux
cvs checkout: Updating mozilla/nsprpub/pkg/solaris
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWnspr
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWnsprx
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWpr
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWpr-devl
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWprd
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWprdx
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWprx
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/SUNWprx-devl
cvs checkout: Updating mozilla/nsprpub/pkg/solaris/common_files
cvs checkout: Updating mozilla/nsprpub/pr
cvs checkout: Updating mozilla/nsprpub/pr/include
cvs checkout: Updating mozilla/nsprpub/pr/include/md
cvs checkout: Updating mozilla/nsprpub/pr/include/obsolete
cvs checkout: Updating mozilla/nsprpub/pr/include/private
cvs checkout: Updating mozilla/nsprpub/pr/src
cvs checkout: Updating mozilla/nsprpub/pr/src/bthreads
cvs checkout: Updating mozilla/nsprpub/pr/src/cplus
cvs checkout: Updating mozilla/nsprpub/pr/src/cplus/tests
cvs checkout: Updating mozilla/nsprpub/pr/src/cthreads
cvs checkout: Updating mozilla/nsprpub/pr/src/io
cvs checkout: Updating mozilla/nsprpub/pr/src/linking
cvs checkout: Updating mozilla/nsprpub/pr/src/malloc
cvs checkout: Updating mozilla/nsprpub/pr/src/md
cvs checkout: Updating mozilla/nsprpub/pr/src/md/beos
cvs checkout: Updating mozilla/nsprpub/pr/src/md/mac
cvs checkout: Updating mozilla/nsprpub/pr/src/md/os2
cvs checkout: Updating mozilla/nsprpub/pr/src/md/unix
cvs checkout: Updating mozilla/nsprpub/pr/src/md/windows
cvs checkout: Updating mozilla/nsprpub/pr/src/memory
cvs checkout: Updating mozilla/nsprpub/pr/src/misc
cvs checkout: Updating mozilla/nsprpub/pr/src/pthreads
cvs checkout: Updating mozilla/nsprpub/pr/src/threads
cvs checkout: Updating mozilla/nsprpub/pr/src/threads/combined
cvs checkout: Updating mozilla/nsprpub/pr/tests
cvs checkout: Updating mozilla/nsprpub/pr/tests/dll
cvs checkout: Updating mozilla/nsprpub/pr/tests/macbuild
cvs checkout: Updating mozilla/nsprpub/pr/tests/w16gui
cvs checkout: Updating mozilla/nsprpub/tools
TB [2012-11-27 18:52:13] CVS checkout mozilla/nsprpub PASSED
TB [2012-11-27 18:52:13] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A mozilla/dbm
cvs checkout: Updating mozilla/dbm
cvs checkout: Updating mozilla/dbm/include
cvs checkout: Updating mozilla/dbm/macbuild
cvs checkout: Updating mozilla/dbm/src
cvs checkout: Updating mozilla/dbm/tests
TB [2012-11-27 18:52:13] CVS checkout mozilla/dbm PASSED
TB [2012-11-27 18:52:13] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A mozilla/security/dbm
cvs checkout: Updating mozilla/security/dbm
cvs checkout: Updating mozilla/security/dbm/config
cvs checkout: Updating mozilla/security/dbm/include
cvs checkout: Updating mozilla/security/dbm/src
cvs checkout: Updating mozilla/security/dbm/tests
TB [2012-11-27 18:52:14] CVS checkout mozilla/security/dbm PASSED
TB [2012-11-27 18:52:14] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A mozilla/security/coreconf
cvs checkout: Updating mozilla/security/coreconf
cvs checkout: Updating mozilla/security/coreconf/mkdepend
cvs checkout: Updating mozilla/security/coreconf/nsinstall
TB [2012-11-27 18:52:15] CVS checkout mozilla/security/coreconf PASSED
TB [2012-11-27 18:52:15] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A mozilla/security/nss
cvs checkout: Updating mozilla/security/nss
cvs checkout: Updating mozilla/security/nss/build
cvs checkout: Updating mozilla/security/nss/build/autoconf
cvs checkout: Updating mozilla/security/nss/build/unix
cvs checkout: Updating mozilla/security/nss/cmd
cvs checkout: Updating mozilla/security/nss/cmd/SSLsample
cvs checkout: Updating mozilla/security/nss/cmd/SSLsample/client
cvs checkout: Updating mozilla/security/nss/cmd/SSLsample/server
cvs checkout: Updating mozilla/security/nss/cmd/addbuiltin
cvs checkout: Updating mozilla/security/nss/cmd/atob
cvs checkout: Updating mozilla/security/nss/cmd/bltest
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/aes_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/aes_cfb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/aes_ctr
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/aes_cts
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/aes_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/aes_gcm
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/camellia_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/camellia_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/des3_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/des3_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/des_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/des_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/dsa
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/ecdsa
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/md2
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/md5
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/rc2_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/rc2_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/rc4
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/rc5_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/rc5_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/rsa
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/seed_cbc
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/seed_ecb
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/sha1
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/sha224
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/sha256
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/sha384
cvs checkout: Updating mozilla/security/nss/cmd/bltest/tests/sha512
cvs checkout: Updating mozilla/security/nss/cmd/btoa
cvs checkout: Updating mozilla/security/nss/cmd/certcgi
cvs checkout: Updating mozilla/security/nss/cmd/certutil
cvs checkout: Updating mozilla/security/nss/cmd/cgi
cvs checkout: Updating mozilla/security/nss/cmd/checkcert
cvs checkout: Updating mozilla/security/nss/cmd/chktest
cvs checkout: Updating mozilla/security/nss/cmd/cipher
cvs checkout: Updating mozilla/security/nss/cmd/cmdlib
cvs checkout: Updating mozilla/security/nss/cmd/crlutil
cvs checkout: Updating mozilla/security/nss/cmd/crmf-cgi
cvs checkout: Updating mozilla/security/nss/cmd/crmftest
cvs checkout: Updating mozilla/security/nss/cmd/dbck
cvs checkout: Updating mozilla/security/nss/cmd/dbdump
cvs checkout: Updating mozilla/security/nss/cmd/dbtest
cvs checkout: Updating mozilla/security/nss/cmd/derdump
cvs checkout: Updating mozilla/security/nss/cmd/digest
cvs checkout: Updating mozilla/security/nss/cmd/doc
cvs checkout: Updating mozilla/security/nss/cmd/ecperf
cvs checkout: Updating mozilla/security/nss/cmd/fipstest
cvs checkout: Updating mozilla/security/nss/cmd/httpserv
cvs checkout: Updating mozilla/security/nss/cmd/ilock
cvs checkout: Updating mozilla/security/nss/cmd/include
cvs checkout: Updating mozilla/security/nss/cmd/keyutil
cvs checkout: Updating mozilla/security/nss/cmd/lib
cvs checkout: Updating mozilla/security/nss/cmd/libpkix
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/perf
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/perf/libpkix_buildthreads
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/perf/nss_threads
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/certsel
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/certsel/certselector
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/certsel/comcertselparams
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/checker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/crlsel
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/crlsel/comcrlselparams
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/crlsel/crlselector
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/params
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/params/buildparams
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/params/procparams
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/params/resourcelimits
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/params/trustanchor
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/params/valparams
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/results
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/results/buildresult
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/results/policynode
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/results/valresult
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/results/verifynode
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/store
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/basicchecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/bc_checker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/buildchain
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/buildchain_partialchain
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/buildchain_resourcelimits
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/buildchain_uchecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/customcrlchecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/defaultcrlchecker2
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/ocspchecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/policychecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/subjaltnamechecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/validatechain
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/validatechain_NB
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/top/validatechain_bc
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/util
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/util/certchain
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/util/error
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/util/list
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/util/list2
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix/util/logger
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/module
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/module/colcertstore
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/module/ekuchecker
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/module/httpcertstore
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/module/pk11certstore
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/module/socket
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/authorityinfoaccess
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/cert
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/certdp
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/crl
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/crlentry
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/date
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/generalname
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/issuingdp
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/nameconstraints
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/subjectinfoaccess
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/pki/x500name
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/bigint
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/bytearray
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/hashtable
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/mem
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/monitorlock
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/mutex
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/mutex2
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/mutex3
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/object
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/oid
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/rwlock
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/stress
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/string
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkix_pl/system/string2
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/pkixutil
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/sample_apps
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/sample_apps/build_chain
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/sample_apps/dumpcert
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/sample_apps/dumpcrl
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/sample_apps/validate_chain
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/testutil
cvs checkout: Updating mozilla/security/nss/cmd/libpkix/testwrapper
cvs checkout: Updating mozilla/security/nss/cmd/listsuites
cvs checkout: Updating mozilla/security/nss/cmd/lowhashtest
cvs checkout: Updating mozilla/security/nss/cmd/makepqg
cvs checkout: Updating mozilla/security/nss/cmd/modutil
cvs checkout: Updating mozilla/security/nss/cmd/multinit
cvs checkout: Updating mozilla/security/nss/cmd/nssutil
cvs checkout: Updating mozilla/security/nss/cmd/ocspclnt
cvs checkout: Updating mozilla/security/nss/cmd/ocspresp
cvs checkout: Updating mozilla/security/nss/cmd/oidcalc
cvs checkout: Updating mozilla/security/nss/cmd/p7content
cvs checkout: Updating mozilla/security/nss/cmd/p7env
cvs checkout: Updating mozilla/security/nss/cmd/p7sign
cvs checkout: Updating mozilla/security/nss/cmd/p7verify
cvs checkout: Updating mozilla/security/nss/cmd/pemtest
cvs checkout: Updating mozilla/security/nss/cmd/pemtests
cvs checkout: Updating mozilla/security/nss/cmd/pemutil
cvs checkout: Updating mozilla/security/nss/cmd/pk11info
cvs checkout: Updating mozilla/security/nss/cmd/pk11mode
cvs checkout: Updating mozilla/security/nss/cmd/pk11util
cvs checkout: Updating mozilla/security/nss/cmd/pk11util/scripts
cvs checkout: Updating mozilla/security/nss/cmd/pk12util
cvs checkout: Updating mozilla/security/nss/cmd/pk1sign
cvs checkout: Updating mozilla/security/nss/cmd/pkiutil
cvs checkout: Updating mozilla/security/nss/cmd/pkix-errcodes
cvs checkout: Updating mozilla/security/nss/cmd/pp
cvs checkout: Updating mozilla/security/nss/cmd/ppcertdata
cvs checkout: Updating mozilla/security/nss/cmd/preenc
cvs checkout: Updating mozilla/security/nss/cmd/psmmsgs
cvs checkout: Updating mozilla/security/nss/cmd/pwdecrypt
cvs checkout: Updating mozilla/security/nss/cmd/regress
cvs checkout: Updating mozilla/security/nss/cmd/replacer
cvs checkout: Updating mozilla/security/nss/cmd/reporter
cvs checkout: Updating mozilla/security/nss/cmd/reporter/tests
cvs checkout: Updating mozilla/security/nss/cmd/revoker
cvs checkout: Updating mozilla/security/nss/cmd/rsaperf
cvs checkout: Updating mozilla/security/nss/cmd/rsaperflo
cvs checkout: Updating mozilla/security/nss/cmd/rsapoptst
cvs checkout: Updating mozilla/security/nss/cmd/samples
cvs checkout: Updating mozilla/security/nss/cmd/sdrtest
cvs checkout: Updating mozilla/security/nss/cmd/selfserv
cvs checkout: Updating mozilla/security/nss/cmd/shexp
cvs checkout: Updating mozilla/security/nss/cmd/shlibsign
cvs checkout: Updating mozilla/security/nss/cmd/shlibsign/mangle
cvs checkout: Updating mozilla/security/nss/cmd/signtool
cvs checkout: Updating mozilla/security/nss/cmd/signver
cvs checkout: Updating mozilla/security/nss/cmd/signver/examples
cvs checkout: Updating mozilla/security/nss/cmd/signver/examples/1
cvs checkout: Updating mozilla/security/nss/cmd/smimetools
cvs checkout: Updating mozilla/security/nss/cmd/sslstrength
cvs checkout: Updating mozilla/security/nss/cmd/ssltap
cvs checkout: Updating mozilla/security/nss/cmd/stopselfserv
cvs checkout: Updating mozilla/security/nss/cmd/strsclnt
cvs checkout: Updating mozilla/security/nss/cmd/swfort
cvs checkout: Updating mozilla/security/nss/cmd/swfort/instinit
cvs checkout: Updating mozilla/security/nss/cmd/swfort/newuser
cvs checkout: Updating mozilla/security/nss/cmd/symkeyutil
cvs checkout: Updating mozilla/security/nss/cmd/sysinit
cvs checkout: Updating mozilla/security/nss/cmd/tests
cvs checkout: Updating mozilla/security/nss/cmd/tstclnt
cvs checkout: Updating mozilla/security/nss/cmd/ttformat
cvs checkout: Updating mozilla/security/nss/cmd/vfychain
cvs checkout: Updating mozilla/security/nss/cmd/vfyserv
cvs checkout: Updating mozilla/security/nss/cmd/zlib
cvs checkout: Updating mozilla/security/nss/coverage
cvs checkout: Updating mozilla/security/nss/lib
cvs checkout: Updating mozilla/security/nss/lib/asn1
cvs checkout: Updating mozilla/security/nss/lib/base
cvs checkout: Updating mozilla/security/nss/lib/certdb
cvs checkout: Updating mozilla/security/nss/lib/certhigh
cvs checkout: Updating mozilla/security/nss/lib/ckfw
cvs checkout: Updating mozilla/security/nss/lib/ckfw/builtins
cvs checkout: Updating mozilla/security/nss/lib/ckfw/capi
cvs checkout: Updating mozilla/security/nss/lib/ckfw/dbm
cvs checkout: Updating mozilla/security/nss/lib/ckfw/nssmkey
cvs checkout: Updating mozilla/security/nss/lib/ckfw/pem
cvs checkout: Updating mozilla/security/nss/lib/crmf
cvs checkout: Updating mozilla/security/nss/lib/cryptohi
U mozilla/security/nss/lib/cryptohi/seckey.c
cvs checkout: Updating mozilla/security/nss/lib/dev
cvs checkout: Updating mozilla/security/nss/lib/fortcrypt
cvs checkout: Updating mozilla/security/nss/lib/fortcrypt/libci
cvs checkout: Updating mozilla/security/nss/lib/fortcrypt/swfort
cvs checkout: Updating mozilla/security/nss/lib/fortcrypt/swfort/pkcs11
cvs checkout: Updating mozilla/security/nss/lib/freebl
cvs checkout: Updating mozilla/security/nss/lib/freebl/ecl
U mozilla/security/nss/lib/freebl/ecl/ecl-curve.h
cvs checkout: Updating mozilla/security/nss/lib/freebl/ecl/tests
cvs checkout: Updating mozilla/security/nss/lib/freebl/mpi
cvs checkout: Updating mozilla/security/nss/lib/freebl/mpi/doc
cvs checkout: Updating mozilla/security/nss/lib/freebl/mpi/tests
cvs checkout: Updating mozilla/security/nss/lib/freebl/mpi/utils
cvs checkout: Updating mozilla/security/nss/lib/freebl/tfm
cvs checkout: Updating mozilla/security/nss/lib/freebl/tfm/demo
cvs checkout: Updating mozilla/security/nss/lib/freebl/tfm/mtest
cvs checkout: Updating mozilla/security/nss/lib/hash
cvs checkout: Updating mozilla/security/nss/lib/jar
cvs checkout: Updating mozilla/security/nss/lib/libpkix
cvs checkout: Updating mozilla/security/nss/lib/libpkix/include
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/certsel
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/checker
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/crlsel
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/params
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/results
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/store
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/top
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix/util
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix_pl_nss
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix_pl_nss/module
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki/SunOS5.10_DBG.OBJ
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki/SunOS5.10_i86pc_gcc_DBG.OBJ
cvs checkout: Updating mozilla/security/nss/lib/libpkix/pkix_pl_nss/system
cvs checkout: Updating mozilla/security/nss/lib/macbuild
cvs checkout: Updating mozilla/security/nss/lib/macbuild/NSS
cvs checkout: Updating mozilla/security/nss/lib/macbuild/NSS/NSS
cvs checkout: Updating mozilla/security/nss/lib/nss
U mozilla/security/nss/lib/nss/utilwrap.c
cvs checkout: Updating mozilla/security/nss/lib/pk11wrap
U mozilla/security/nss/lib/pk11wrap/pk11cxt.c
U mozilla/security/nss/lib/pk11wrap/pk11obj.c
U mozilla/security/nss/lib/pk11wrap/pk11pub.h
cvs checkout: Updating mozilla/security/nss/lib/pkcs12
cvs checkout: Updating mozilla/security/nss/lib/pkcs7
U mozilla/security/nss/lib/pkcs7/p7decode.c
U mozilla/security/nss/lib/pkcs7/secpkcs7.h
cvs checkout: Updating mozilla/security/nss/lib/pki
cvs checkout: Updating mozilla/security/nss/lib/pki/doc
cvs checkout: Updating mozilla/security/nss/lib/pki1
cvs checkout: Updating mozilla/security/nss/lib/pkix
cvs checkout: Updating mozilla/security/nss/lib/pkix/doc
cvs checkout: Updating mozilla/security/nss/lib/pkix/include
cvs checkout: Updating mozilla/security/nss/lib/pkix/src
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AccessDescription
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AdministrationDomainName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AlgorithmIdentifier
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AnotherName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/Attribute
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AttributeTypeAndValue
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AuthorityInfoAccessSyntax
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/AuthorityKeyIdentifier
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/BasicConstraints
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/BuiltInDomainDefinedAttribute
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/BuiltInDomainDefinedAttributes
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/BuiltInStandardAttributes
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/CPSuri
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/CRLDistPointsSyntax
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/Certificate
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/CertificateList
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/CertificatePolicies
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/CommonName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/CountryName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/DirectoryString
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/DisplayText
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/DistributionPoint
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/DistributionPointName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/EDIPartyName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/ExtKeyUsageSyntax
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/ExtendedNetworkAddress
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/ExtensionAttribute
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/ExtensionAttributes
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/GeneralName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/GeneralNames
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/GeneralSubtree
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/GeneralSubtrees
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/IssuingDistributionPoint
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/KeyUsage
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/Name
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/NameConstraints
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/NetworkAddress
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/NoticeReference
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/NumericUserIdentifier
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/ORAddress
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/OrganizationName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/OrganizationalUnitName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/OrganizationalUnitNames
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PDSName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PDSParameter
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PersonalName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PhysicalDeliveryCountryName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/Pkcs9email
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PolicyConstraints
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PolicyInformation
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PolicyMappings
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PolicyQualifierInfo
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PostalCode
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PrivateDomainName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/PrivateKeyUsagePeriod
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/RDNSequence
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/ReasonFlags
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/RelativeDistinguishedName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/SubjectDirectoryAttributes
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/SubjectPublicKeyInfo
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TBSCertList
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TBSCertificate
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexCommonName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexDomainDefinedAttribute
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexDomainDefinedAttributes
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexOrganizationName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexOrganizationalUnitName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexOrganizationalUnitNames
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TeletexPersonalName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/TerminalIdentifier
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/Time
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/UserNotice
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/Validity
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X121Address
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520CommonName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520LocalityName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520Name
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520OrganizationName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520OrganizationalUnitName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520StateOrProvinceName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520Title
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520countryName
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/X520dnQualifier
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/e1634Address
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/policyMapping
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/revokedCertificate
cvs checkout: Updating mozilla/security/nss/lib/pkix/src/revokedCertificates
cvs checkout: Updating mozilla/security/nss/lib/pkix/test
cvs checkout: Updating mozilla/security/nss/lib/rdb
cvs checkout: Updating mozilla/security/nss/lib/smime
cvs checkout: Updating mozilla/security/nss/lib/softoken
cvs checkout: Updating mozilla/security/nss/lib/softoken/legacydb
cvs checkout: Updating mozilla/security/nss/lib/sqlite
cvs checkout: Updating mozilla/security/nss/lib/ssl
cvs checkout: Updating mozilla/security/nss/lib/sysinit
cvs checkout: Updating mozilla/security/nss/lib/util
U mozilla/security/nss/lib/util/base64.h
U mozilla/security/nss/lib/util/nssb64d.c
cvs checkout: Updating mozilla/security/nss/lib/zlib
cvs checkout: Updating mozilla/security/nss/lib/zlib/patches
cvs checkout: Updating mozilla/security/nss/macbuild
cvs checkout: Updating mozilla/security/nss/pkg
cvs checkout: Updating mozilla/security/nss/pkg/linux
cvs checkout: Updating mozilla/security/nss/pkg/solaris
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWnss3
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtls
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtls-devl
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtlsd
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtlsdx
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtlsu
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtlsux
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtlsx
cvs checkout: Updating mozilla/security/nss/pkg/solaris/SUNWtlsx-devl
cvs checkout: Updating mozilla/security/nss/pkg/solaris/common_files
cvs checkout: Updating mozilla/security/nss/ppcertdata
cvs checkout: Updating mozilla/security/nss/tests
cvs checkout: Updating mozilla/security/nss/tests/bltest
cvs checkout: Updating mozilla/security/nss/tests/cert
cvs checkout: Updating mozilla/security/nss/tests/chains
cvs checkout: Updating mozilla/security/nss/tests/chains/ocspd-config
cvs checkout: Updating mozilla/security/nss/tests/chains/scenarios
cvs checkout: Updating mozilla/security/nss/tests/cipher
cvs checkout: Updating mozilla/security/nss/tests/cmdtests
cvs checkout: Updating mozilla/security/nss/tests/common
cvs checkout: Updating mozilla/security/nss/tests/crmf
cvs checkout: Updating mozilla/security/nss/tests/dbtests
cvs checkout: Updating mozilla/security/nss/tests/dbupgrade
cvs checkout: Updating mozilla/security/nss/tests/doc
cvs checkout: Updating mozilla/security/nss/tests/fips
cvs checkout: Updating mozilla/security/nss/tests/iopr
cvs checkout: Updating mozilla/security/nss/tests/iopr/cgi-bin
cvs checkout: Updating mozilla/security/nss/tests/iopr/server_scr
cvs checkout: Updating mozilla/security/nss/tests/libpkix
cvs checkout: Updating mozilla/security/nss/tests/libpkix/certs
cvs checkout: Updating mozilla/security/nss/tests/libpkix/certs/extKeyUsage
cvs checkout: Updating mozilla/security/nss/tests/libpkix/certs/generalName
cvs checkout: Updating mozilla/security/nss/tests/libpkix/certs/keyIdentifier
cvs checkout: Updating mozilla/security/nss/tests/libpkix/certs/keyUsage
cvs checkout: Updating mozilla/security/nss/tests/libpkix/certs/publicKey
cvs checkout: Updating mozilla/security/nss/tests/libpkix/common
cvs checkout: Updating mozilla/security/nss/tests/libpkix/libpkix
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/module
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/module/rev_data/local
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/pki
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/pki/rev_data
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/pki/rev_data/local
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_pl_tests/system
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/certsel
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/checker
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/crlsel
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/params
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/results
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/store
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/backtracking
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/backtracking/signature
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/fail
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/multi_path/signature/pass
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/single_path
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature/fail
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/single_path/signature/pass
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/test1
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/test2
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/build_data/test3
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/rev_data
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/rev_data/crlchecker
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/rev_data/multiple_certstores
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/rev_data/multiple_certstores/store1
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/top/rev_data/multiple_certstores/store2
cvs checkout: Updating mozilla/security/nss/tests/libpkix/pkix_tests/util
cvs checkout: Updating mozilla/security/nss/tests/libpkix/sample_apps
cvs checkout: Updating mozilla/security/nss/tests/lowhash
cvs checkout: Updating mozilla/security/nss/tests/memleak
cvs checkout: Updating mozilla/security/nss/tests/merge
cvs checkout: Updating mozilla/security/nss/tests/multinit
cvs checkout: Updating mozilla/security/nss/tests/ocsp
cvs checkout: Updating mozilla/security/nss/tests/pem
cvs checkout: Updating mozilla/security/nss/tests/perf
cvs checkout: Updating mozilla/security/nss/tests/pkcs11
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape/suites
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape/suites/security
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape/suites/security/pkcs11
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape/suites/security/ssl
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape/suites/security/ssl/AIX4.3_DBG.OBJ
cvs checkout: Updating mozilla/security/nss/tests/pkcs11/netscape/trivial
cvs checkout: Updating mozilla/security/nss/tests/pkits
cvs checkout: Updating mozilla/security/nss/tests/sdr
cvs checkout: Updating mozilla/security/nss/tests/smime
cvs checkout: Updating mozilla/security/nss/tests/ssl
cvs checkout: Updating mozilla/security/nss/tests/stan
cvs checkout: Updating mozilla/security/nss/tests/stan/client
cvs checkout: Updating mozilla/security/nss/tests/stan/server
cvs checkout: Updating mozilla/security/nss/tests/tools
TB [2012-11-27 18:52:19] CVS checkout mozilla/security/nss PASSED
TB [2012-11-27 18:52:19] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A mozilla/security/jss
cvs checkout: Updating mozilla/security/jss
cvs checkout: Updating mozilla/security/jss/cmd
cvs checkout: Updating mozilla/security/jss/cmd/jssjava
cvs checkout: Updating mozilla/security/jss/com
cvs checkout: Updating mozilla/security/jss/config
cvs checkout: Updating mozilla/security/jss/lib
cvs checkout: Updating mozilla/security/jss/org
cvs checkout: Updating mozilla/security/jss/org/mozilla
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/SecretDecoderRing
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/asn1
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/crypto
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/crypto_native
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/fips181
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/hclhacks
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/manage
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkcs10
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkcs11
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkcs12
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkcs7
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix/cert
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix/cmc
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix/cmmf
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix/cms
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix/crmf
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/pkix/primitive
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/provider
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/provider/java
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/provider/java/security
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/provider/javax
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/provider/javax/crypto
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/ssl
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/tests
cvs checkout: Updating mozilla/security/jss/org/mozilla/jss/util
cvs checkout: Updating mozilla/security/jss/pkg
cvs checkout: Updating mozilla/security/jss/pkg/linux
cvs checkout: Updating mozilla/security/jss/pkg/solaris
cvs checkout: Updating mozilla/security/jss/pkg/solaris/ROOT-SunOS5.8_DBG.OBJ
cvs checkout: Updating mozilla/security/jss/pkg/solaris/SUNWjss
cvs checkout: Updating mozilla/security/jss/pkg/solaris/SUNWjss3
cvs checkout: Updating mozilla/security/jss/pkg/solaris/SUNWjssx
cvs checkout: Updating mozilla/security/jss/pkg/solaris/common_files
cvs checkout: Updating mozilla/security/jss/samples
TB [2012-11-27 18:52:20] CVS checkout mozilla/security/jss PASSED
TB [2012-11-27 18:52:20] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot co -A -r NSS_3_11_1_RTM mozilla/security/nss/lib/freebl/ecl/ecl-curve.h
U mozilla/security/nss/lib/freebl/ecl/ecl-curve.h
TB [2012-11-27 18:52:22] CVS checkout -r NSS_3_11_1_RTM mozilla/security/nss/lib/freebl/ecl/ecl-curve.h PASSED
TB [2012-11-27 18:52:22] $ cvs -d :pserver:anonymous@cvs-mirror.mozilla.org:/cvsroot stat mozilla
TB [2012-11-27 18:52:24] CVS stat mozilla PASSED
-   Repository revision:1.69/cvsroot/mozilla/security/nss/lib/cryptohi/seckey.c,v
+   Repository revision:1.70/cvsroot/mozilla/security/nss/lib/cryptohi/seckey.c,v
-   Repository revision:1.7/cvsroot/mozilla/security/nss/lib/nss/utilwrap.c,v
+   Repository revision:1.8/cvsroot/mozilla/security/nss/lib/nss/utilwrap.c,v
-   Repository revision:1.9/cvsroot/mozilla/security/nss/lib/pk11wrap/pk11cxt.c,v
+   Repository revision:1.10/cvsroot/mozilla/security/nss/lib/pk11wrap/pk11cxt.c,v
-   Repository revision:1.28/cvsroot/mozilla/security/nss/lib/pk11wrap/pk11obj.c,v
+   Repository revision:1.29/cvsroot/mozilla/security/nss/lib/pk11wrap/pk11obj.c,v
-   Repository revision:1.41/cvsroot/mozilla/security/nss/lib/pk11wrap/pk11pub.h,v
+   Repository revision:1.42/cvsroot/mozilla/security/nss/lib/pk11wrap/pk11pub.h,v
-   Repository revision:1.29/cvsroot/mozilla/security/nss/lib/pkcs7/p7decode.c,v
+   Repository revision:1.30/cvsroot/mozilla/security/nss/lib/pkcs7/p7decode.c,v
-   Repository revision:1.9/cvsroot/mozilla/security/nss/lib/pkcs7/secpkcs7.h,v
+   Repository revision:1.10/cvsroot/mozilla/security/nss/lib/pkcs7/secpkcs7.h,v
-   Repository revision:1.4/cvsroot/mozilla/security/nss/lib/util/base64.h,v
+   Repository revision:1.5/cvsroot/mozilla/security/nss/lib/util/base64.h,v
-   Repository revision:1.9/cvsroot/mozilla/security/nss/lib/util/nssb64d.c,v
+   Repository revision:1.10/cvsroot/mozilla/security/nss/lib/util/nssb64d.c,v
TB [2012-11-27 18:52:25] CVS change detected
TinderboxPrint:CVS change
TB [2012-11-27 18:52:26] $ cd /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG
TB [2012-11-27 18:52:26] ######## NSS - build - 64 bits - DBG ########
TB [2012-11-27 18:52:26] $ cd /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss
TB [2012-11-27 18:52:26] $ gmake clean nss_build_all
rm -rf     Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
cd lib; gmake clean
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib'
rm -rf     Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
cd util; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/util'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssutil.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssutil3.so  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/quickder.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secdig.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derdec.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derenc.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dersubr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dertime.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/errstrs.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssb64d.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssb64e.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssrwlk.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssilock.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/oidstring.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/portreg.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secalgid.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secasn1d.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secasn1e.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secasn1u.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secitem.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secload.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secoid.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sectime.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secport.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/templates.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utf8.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utilmod.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utilpars.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/util'
cd freebl; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/freebl'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libfreebl.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libfreebl3.so  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/loader.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core   so_locations  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB 
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/freebl'
cd sqlite; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/sqlite'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsqlite.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsqlite3.so  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sqlite3.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/sqlite'
cd softoken; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsoftokn.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsoftokn3.so  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ecdecode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipsaudt.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstokn.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgglue.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowpbe.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/padbuf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkcs11.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkcs11c.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkcs11u.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/rsawrapr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sftkdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sftkpars.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sftkpwd.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/softkver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tlsprf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jpakesftk.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
cd legacydb; gmake clean
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken/legacydb'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdbm.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdbm3.so  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dbmshim.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/keydb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgattr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgcreate.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgdestroy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgfind.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lginit.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowcert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pcertdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11db.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken/legacydb'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken'
cd base; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/base'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssb.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/arena.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/error.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/errorval.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hashops.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libc.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tracker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/item.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utf8.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/list.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hash.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/base'
cd dev; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/dev'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdev.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/devslot.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/devtoken.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/devutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ckhelper.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/dev'
cd pki; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pki'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsspki.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/asymmkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certificate.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cryptocontext.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/symmkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/trustdomain.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tdcache.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certdecode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkistore.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkibase.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pki3hack.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pki'
cd libpkix; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
cd include; gmake clean
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/include'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/include'
cd pkix; gmake clean
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
cd certsel; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/certsel'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixcertsel.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_certselector.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_comcertselparams.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/certsel'
cd crlsel; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/crlsel'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixcrlsel.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_crlselector.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_comcrlselparams.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/crlsel'
cd checker; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/checker'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixchecker.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_basicconstraintschecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_certchainchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_crlchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_ekuchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_expirationchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_namechainingchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_nameconstraintschecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_ocspchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_revocationmethod.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_revocationchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_policychecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_signaturechecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_targetcertchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/checker'
cd params; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/params'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixparams.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_trustanchor.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_procparams.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_valparams.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_resourcelimits.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/params'
cd results; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/results'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixresults.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_buildresult.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_policynode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_valresult.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_verifynode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/results'
cd store; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/store'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixstore.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_store.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/store'
cd top; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/top'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixtop.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_validate.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_lifecycle.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_build.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/top'
cd util; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/util'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixutil.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_tools.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_error.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_logger.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_list.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_errpaths.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/util'
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix'
cd pkix_pl_nss; gmake clean
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
cd pki; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixpki.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_basicconstraints.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_cert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_certpolicyinfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_certpolicymap.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_certpolicyqualifier.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_crl.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_crldp.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_crlentry.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_date.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_generalname.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_infoaccess.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_nameconstraints.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ocsprequest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ocspresponse.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_publickey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_x500name.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ocspcertid.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixsystem.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_bigint.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_bytearray.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_common.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_error.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_hashtable.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_lifecycle.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_mem.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_monitorlock.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_mutex.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_object.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_oid.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_primhash.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_rwlock.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_string.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
cd module; gmake clean
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixmodule.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_aiamgr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_colcertstore.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_httpcertstore.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_httpdefaultclient.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldaptemplates.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldapcertstore.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldapresponse.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldaprequest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldapdefaultclient.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_nsscontext.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_pk11certstore.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_socket.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix'
cd certdb; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/certdb'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcertdb.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/alg1485.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certv3.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certxutl.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crl.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/genname.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/stanpcertdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/polcyxtn.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secname.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xauthkid.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xbsconst.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xconst.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/certdb'
cd certhigh; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/certhigh'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcerthi.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certhtml.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certreq.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlv2.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocsp.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspsig.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certhigh.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certvfy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certvfypkix.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certvfypkixprint.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xcrldist.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/certhigh'
cd pk11wrap; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pk11wrap'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpk11wrap.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dev3hack.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11akey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11auth.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11cert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11cxt.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11err.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11kea.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11list.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11load.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11mech.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11merge.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11nobj.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11obj.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pars.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pbe.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pk12.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pqg.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11sdr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11skey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11slot.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11util.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pk11wrap'
cd cryptohi; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/cryptohi'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcryptohi.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sechash.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/seckey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secsign.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secvfy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dsautil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/cryptohi'
cd nss; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/nss'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnss.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnss3.so  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssinit.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utilwrap.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/nss'
cd ssl; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ssl'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libssl.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libssl3.so  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derive.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dtlscon.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/prelib.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3con.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3gthr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslauth.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslcon.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssldef.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslenum.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslerr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslerrstrs.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslinit.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3ext.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslgathr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslmutex.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslnonce.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslreveal.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslsecur.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslsnce.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslsock.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssltrace.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/authcert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmpcert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslinfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3ecc.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/unix_err.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ssl'
cd pkcs12; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pkcs12'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkcs12.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12local.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12creat.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12dec.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12plcy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12tmpl.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12e.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12d.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pkcs12'
cd pkcs7; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pkcs7'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkcs7.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certread.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7common.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7create.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7decode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7encode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7local.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secmime.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pkcs7'
cd smime; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/smime'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsmime.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsmime3.so  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsarray.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsasn1.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsattr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmscinfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmscipher.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsdecode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsdigdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsdigest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsencdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsencode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsenvdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsmessage.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmspubkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsrecinfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsreclist.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmssigdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmssiginfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsudf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smimemessage.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smimeutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smimever.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/smime'
cd crmf; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/crmf'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcrmf.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfenc.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmftmpl.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfreq.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfpop.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfdec.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfget.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfcont.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmmfasn1.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmmfresp.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmmfrec.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmmfchal.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/servget.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/encutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/respcli.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/respcmn.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/challcli.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/asn1cmn.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/crmf'
cd jar; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/jar'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libjar.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jarver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jarsign.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jar.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jar-ds.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jarfile.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jarint.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/jar'
cd ckfw; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssckfw.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crypto.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/find.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hash.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/instance.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mutex.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/object.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/session.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sessobj.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/slot.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/token.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/wrap.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mechanism.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
cd builtins; gmake clean
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw/builtins'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssckbi.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/anchor.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/constants.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bfind.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/binst.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bobject.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bsession.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bslot.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/btoken.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ckbiver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw/builtins'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw'
cd sysinit; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/sysinit'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsssysinit.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsssysinit.so  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsssysinit.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/sysinit'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib'
cd cmd; gmake clean
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd'
rm -rf     Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
cd lib; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/lib'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsectool.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/basicutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secpwd.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derprint.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/moreoids.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pppolicy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ffs.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11table.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/lib'
cd addbuiltin; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/addbuiltin'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/addbuiltin Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/addbuiltin.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/addbuiltin'
cd atob; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/atob'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/atob Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/atob.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/atob'
cd bltest; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/bltest'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bltest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/blapitest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/bltest'
cd btoa; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/btoa'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/btoa Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/btoa.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/btoa'
cd certcgi; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/certcgi'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certcgi Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certcgi.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/certcgi'
cd certutil; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/certutil'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certutil Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certext.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/keystuff.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/certutil'
cd checkcert; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/checkcert'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/checkcert Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/checkcert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/checkcert'
cd chktest; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/chktest'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/chktest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/chktest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/chktest'
cd crlutil; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/crlutil'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlutil Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlgen_lex.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlgen.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/crlutil'
cd crmftest; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/crmftest'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmftest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/testcrmf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/crmftest'
cd dbtest; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/dbtest'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dbtest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dbtest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/dbtest'
cd derdump; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/derdump'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derdump Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derdump.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/derdump'
cd digest; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/digest'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/digest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/digest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/digest'
cd httpserv; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/httpserv'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/httpserv Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/httpserv.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/httpserv'
cd fipstest; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/fipstest'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/fipstest'
cd lowhashtest; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/lowhashtest'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowhashtest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowhashtest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/lowhashtest'
cd listsuites; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/listsuites'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/listsuites Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/listsuites.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/listsuites'
cd makepqg; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/makepqg'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/makepqg Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/makepqg.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/makepqg'
cd multinit; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/multinit'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/multinit Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/multinit.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/multinit'
cd ocspclnt; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ocspclnt'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspclnt Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspclnt.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ocspclnt'
cd ocspresp; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ocspresp'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspresp Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspresp.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ocspresp'
cd oidcalc; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/oidcalc'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/oidcalc Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/oidcalc.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/oidcalc'
cd p7content; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7content'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7content Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7content.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7content'
cd p7env; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7env'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7env Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7env.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7env'
cd p7sign; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7sign'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7sign Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7sign.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7sign'
cd p7verify; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7verify'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7verify Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7verify.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7verify'
cd pk12util; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk12util'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk12util Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk12util.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk12util'
cd pk11mode; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk11mode'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11mode Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11mode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk11mode'
cd pk1sign; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk1sign'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk1sign Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk1sign.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk1sign'
cd pkix-errcodes; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pkix-errcodes'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix-errcodes Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix-errcodes.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pkix-errcodes'
cd pp; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pp'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pp Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pp.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pp'
cd pwdecrypt; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pwdecrypt'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pwdecrypt Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pwdecrypt.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pwdecrypt'
cd rsaperf; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/rsaperf'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/rsaperf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/rsaperf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/defkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/rsaperf'
cd sdrtest; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/sdrtest'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sdrtest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sdrtest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/sdrtest'
cd selfserv; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/selfserv'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/selfserv Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/selfserv.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/selfserv'
cd signtool; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/signtool'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/signtool Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/signtool.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certgen.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/javascript.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/list.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sign.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/util.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/verify.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/zip.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/signtool'
cd signver; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/signver'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/signver Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/signver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk7print.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/signver'
cd shlibsign; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/shlibsign Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/shlibsign.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations   ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn3.chk ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdbm3.chk
cd mangle; gmake clean
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/mangle'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mangle Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mangle.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/mangle'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign'
cd smimetools; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/smimetools'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsutil Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/smimetools'
cd ssltap; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ssltap'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssltap Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssltap.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ssltap'
cd strsclnt; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/strsclnt'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/strsclnt Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/strsclnt.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/strsclnt'
cd symkeyutil; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/symkeyutil'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/symkeyutil Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/symkeyutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/symkeyutil'
cd tests; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/tests'
rm -rf Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/baddbdir Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/conflict Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dertimetest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/encodeinttest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nonspr10 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/remtest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secmodtest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/baddbdir.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/conflict.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dertimetest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/encodeinttest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nonspr10.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/remtest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secmodtest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/tests'
cd tstclnt; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/tstclnt'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tstclnt Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tstclnt.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/tstclnt'
cd vfychain; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/vfychain'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfychain Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfychain.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/vfychain'
cd vfyserv; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/vfyserv'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfyserv Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfyserv.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfyutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/vfyserv'
cd modutil; gmake clean
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/modutil'
rm -rf   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/modutil Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/modutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/instsec.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/install.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/installparse.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/install-ds.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lex.Pk11Install_yy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ LOGS TAGS Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/.md core  so_locations  
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/modutil'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd'
gmake -C ../coreconf
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/coreconf'
cd nsinstall; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/coreconf/nsinstall'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/coreconf/nsinstall'
cd nsinstall; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/coreconf/nsinstall'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf  nsinstall.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pathsub.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf  pathsub.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pathsub.o    -lpthread  -ldl -lc
true -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall ../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/coreconf/nsinstall'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/coreconf'
../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -D ../../nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ
cd ../../nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ ; \
 sh ../configure \
--enable-64bit \
--with-dist-prefix='/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ' \
--with-dist-includedir='/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include'
creating cache ./config.cache
checking host system type... x86_64-unknown-linux-gnu
checking target system type... x86_64-unknown-linux-gnu
checking build system type... x86_64-unknown-linux-gnu
checking for whoami... /usr/bin/whoami
checking for gcc... gcc
checking whether the C compiler (gcc  ) works... yes
checking whether the C compiler (gcc  ) is a cross-compiler... no
checking whether we are using GNU C... yes
checking whether gcc accepts -g... yes
checking how to run the C preprocessor... gcc -E
checking for ranlib... ranlib
checking for as... /usr/bin/as
checking for ar... /usr/bin/ar
checking for ld... /usr/bin/ld
checking for strip... /usr/bin/strip
checking for windres... no
checking for gcc -pipe support... no
checking whether C compiler supports -fprofile-generate... yes
checking for visibility(hidden) attribute... yes
checking for visibility pragma support... yes
checking for perl5... no
checking for perl... /usr/bin/perl
checking for dlopen in -ldl... yes
checking for dlfcn.h... yes
checking whether gcc needs -traditional... no
checking for lchown... yes
checking for strerror... yes
checking for dladdr... yes
checking for pthread_create in -lpthreads... no
checking for pthread_create in -lpthread... yes
checking whether gcc accepts -pthread... yes
updating cache ./config.cache
creating ./config.status
creating Makefile
creating config/Makefile
creating config/autoconf.mk
creating config/nsprincl.mk
creating config/nsprincl.sh
creating config/nspr-config
creating config/nspr.pc
creating lib/Makefile
creating lib/ds/Makefile
creating lib/libc/Makefile
creating lib/libc/include/Makefile
creating lib/libc/src/Makefile
creating lib/tests/Makefile
creating pkg/Makefile
creating pr/Makefile
creating pr/include/Makefile
creating pr/include/md/Makefile
creating pr/include/obsolete/Makefile
creating pr/include/private/Makefile
creating pr/src/Makefile
creating pr/src/io/Makefile
creating pr/src/linking/Makefile
creating pr/src/malloc/Makefile
creating pr/src/md/Makefile
creating pr/src/md/unix/Makefile
creating pr/src/memory/Makefile
creating pr/src/misc/Makefile
creating pr/src/threads/Makefile
creating pr/tests/Makefile
creating pr/tests/dll/Makefile
creating pkg/linux/Makefile
creating pr/src/pthreads/Makefile
gmake -C ../../nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ'
gmake -C config export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/config'
gcc -o now.o -c      -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM   ../../config/now.c
gcc  now.o   -o now
gcc -o nsinstall.o -c      -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM   ../../config/nsinstall.c
gcc  nsinstall.o   -o nsinstall
rm -f nfspwd; cp ../../config/nfspwd.pl nfspwd; chmod +x nfspwd
rm -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin/nspr-config
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/config'
gmake -C pr export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr'
gmake -C include export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/include'
gmake -C md export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/include/md'
../../../config/./nsinstall -R -m 444 ../../../../pr/include/md/_openbsd.cfg ../../../../pr/include/md/_winnt.cfg ../../../../pr/include/md/_nto.cfg ../../../../pr/include/md/_riscos.cfg ../../../../pr/include/md/_dgux.cfg ../../../../pr/include/md/_aix32.cfg ../../../../pr/include/md/_hpux64.cfg ../../../../pr/include/md/_os2.cfg ../../../../pr/include/md/_linux.cfg ../../../../pr/include/md/_qnx.cfg ../../../../pr/include/md/_darwin.cfg ../../../../pr/include/md/_beos.cfg ../../../../pr/include/md/_irix32.cfg ../../../../pr/include/md/_irix64.cfg ../../../../pr/include/md/_win95.cfg ../../../../pr/include/md/_netbsd.cfg ../../../../pr/include/md/_solaris.cfg ../../../../pr/include/md/_unixware7.cfg ../../../../pr/include/md/_freebsd.cfg ../../../../pr/include/md/_scoos.cfg ../../../../pr/include/md/_osf1.cfg ../../../../pr/include/md/_unixware.cfg ../../../../pr/include/md/_aix64.cfg ../../../../pr/include/md/_symbian.cfg ../../../../pr/include/md/_hpux32.cfg ../../../../pr/include/md/_bsdi.cfg /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include/md
../../../config/./nsinstall -R -m 444 ../../../../pr/include/md/_linux.cfg /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include
mv -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include/_linux.cfg /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include/prcpucfg.h
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/include/md'
gmake -C private export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/include/private'
../../../config/./nsinstall -R -m 444 ../../../../pr/include/private/pprio.h ../../../../pr/include/private/pprthred.h ../../../../pr/include/private/prpriv.h /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include/private
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/include/private'
gmake -C obsolete export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/include/obsolete'
../../../config/./nsinstall -R -m 444 ../../../../pr/include/obsolete/pralarm.h ../../../../pr/include/obsolete/probslet.h ../../../../pr/include/obsolete/protypes.h ../../../../pr/include/obsolete/prsem.h /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include/obsolete
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/include/obsolete'
../../config/./nsinstall -R -m 444 ../../../pr/include/prmon.h ../../../pr/include/prmwait.h ../../../pr/include/prrng.h ../../../pr/include/prprf.h ../../../pr/include/prtypes.h ../../../pr/include/prenv.h ../../../pr/include/prlink.h ../../../pr/include/prdtoa.h ../../../pr/include/prolock.h ../../../pr/include/prtrace.h ../../../pr/include/prlog.h ../../../pr/include/prproces.h ../../../pr/include/prsystem.h ../../../pr/include/prinet.h ../../../pr/include/prinrval.h ../../../pr/include/prmem.h ../../../pr/include/prtime.h ../../../pr/include/prwin16.h ../../../pr/include/prcmon.h ../../../pr/include/prtpool.h ../../../pr/include/prshm.h ../../../pr/include/prerr.h ../../../pr/include/prcountr.h ../../../pr/include/prclist.h ../../../pr/include/prerror.h ../../../pr/include/prcvar.h ../../../pr/include/prio.h ../../../pr/include/prrwlock.h ../../../pr/include/prlock.h ../../../pr/include/prinit.h ../../../pr/include/pratom.h ../../../pr/include/prpdce.h ../../../pr/include/prlong.h ../../../pr/include/prshma.h ../../../pr/include/prvrsion.h ../../../pr/include/nspr.h ../../../pr/include/pripcsem.h ../../../pr/include/prnetdb.h ../../../pr/include/prthread.h ../../../pr/include/prbit.h /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/include'
gmake -C src export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src'
gmake -C io export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/io'
gcc -o prfdcach.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prfdcach.c
gcc -o prmwait.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prmwait.c
gcc -o priometh.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/priometh.c
gcc -o pripv6.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/pripv6.c
gcc -o prmapopt.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prmapopt.c
gcc -o prlayer.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prlayer.c
gcc -o prlog.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prlog.c
gcc -o prmmap.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prmmap.c
gcc -o prpolevt.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prpolevt.c
gcc -o prprf.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prprf.c
gcc -o prscanf.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prscanf.c
gcc -o prstdio.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/io/prstdio.c
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/io'
gmake -C linking export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/linking'
gcc -o prlink.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/linking/prlink.c
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/linking'
gmake -C malloc export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/malloc'
gcc -o prmalloc.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/malloc/prmalloc.c
gcc -o prmem.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/malloc/prmem.c
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/malloc'
gmake -C md export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/md'
gmake -C unix export
gmake[5]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/md/unix'
gcc -o unix.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private  ../../../../../pr/src/md/unix/unix.c
gcc -o unix_errors.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private  ../../../../../pr/src/md/unix/unix_errors.c
gcc -o uxproces.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private  ../../../../../pr/src/md/unix/uxproces.c
gcc -o uxrng.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private  ../../../../../pr/src/md/unix/uxrng.c
gcc -o uxshm.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private  ../../../../../pr/src/md/unix/uxshm.c
gcc -o uxwrap.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private  ../../../../../pr/src/md/unix/uxwrap.c
gcc -o linux.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private  ../../../../../pr/src/md/unix/linux.c
gcc -o os_Linux_x86_64.o -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../pr/include -I../../../../../pr/include/private  -c ../../../../../pr/src/md/unix/os_Linux_x86_64.s
gmake[5]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/md/unix'
gcc -o prosdep.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include  ../../../../pr/src/md/prosdep.c
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/md'
gmake -C memory export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/memory'
gcc -o prseg.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/memory/prseg.c
gcc -o prshm.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/memory/prshm.c
gcc -o prshma.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/memory/prshma.c
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/memory'
gmake -C misc export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/misc'
gcc -o pralarm.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/pralarm.c
gcc -o pratom.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/pratom.c
gcc -o prcountr.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prcountr.c
gcc -o prdtoa.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prdtoa.c
gcc -o prenv.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prenv.c
../../../../pr/src/misc/prenv.c: In function PR_SetEnv:
../../../../pr/src/misc/prenv.c:64:5: warning: passing argument 1 of putenv discards const qualifier from pointer target type [enabled by default]
In file included from /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include/prmem.h:15:0,
                 from /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include/nspr.h:26,
                 from ../../../../pr/include/private/primpl.h:39,
                 from ../../../../pr/src/misc/prenv.c:7:
/usr/include/stdlib.h:579:12: note: expected char * but argument is of type const char *
gcc -o prerr.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prerr.c
gcc -o prerror.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prerror.c
gcc -o prerrortable.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prerrortable.c
gcc -o prinit.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prinit.c
gcc -o prinrval.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prinrval.c
gcc -o pripc.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/pripc.c
gcc -o prlog2.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prlog2.c
gcc -o prlong.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prlong.c
gcc -o prnetdb.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prnetdb.c
../../../../pr/src/misc/prnetdb.c: In function pr_NetAddrToStringGNI:
../../../../pr/src/misc/prnetdb.c:2255:14: warning: variable md_af set but not used [-Wunused-but-set-variable]
gcc -o praton.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/praton.c
gcc -o prolock.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prolock.c
gcc -o prrng.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prrng.c
gcc -o prsystem.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prsystem.c
gcc -o prtime.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prtime.c
gcc -o prthinfo.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prthinfo.c
gcc -o prtpool.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prtpool.c
gcc -o prtrace.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/misc/prtrace.c
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/misc'
gmake -C threads export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/threads'
gcc -o prcmon.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/threads/prcmon.c
gcc -o prrwlock.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/threads/prrwlock.c
gcc -o prtpd.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/threads/prtpd.c
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/threads'
gmake -C pthreads export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/pthreads'
gcc -o ptio.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/pthreads/ptio.c
../../../../pr/src/pthreads/ptio.c: In function pt_Connect:
../../../../pr/src/pthreads/ptio.c:1545:11: warning: variable md_af set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptio.c: In function pt_Bind:
../../../../pr/src/pthreads/ptio.c:1735:11: warning: variable md_af set but not used [-Wunused-but-set-variable]
../../../../pr/src/pthreads/ptio.c: In function pt_SendTo:
../../../../pr/src/pthreads/ptio.c:1992:11: warning: variable md_af set but not used [-Wunused-but-set-variable]
gcc -o ptsynch.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/pthreads/ptsynch.c
gcc -o ptthread.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/pthreads/ptthread.c
gcc -o ptmisc.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../pr/include -I../../../../pr/include/private  ../../../../pr/src/pthreads/ptmisc.c
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src/pthreads'
gmake build
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src'
gcc -o prvrsion.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../pr/include -I../../../pr/include/private  -I. ../../../pr/src/prvrsion.c
../../../pr/src/prvrsion.c: In function libVersionPoint:
../../../pr/src/prvrsion.c:84:17: warning: variable dummy set but not used [-Wunused-but-set-variable]
rm -f libnspr4.a
/usr/bin/ar cr libnspr4.a ./prvrsion.o io/./prfdcach.o io/./prmwait.o io/./prmapopt.o io/./priometh.o io/./pripv6.o io/./prlayer.o io/./prlog.o io/./prmmap.o io/./prpolevt.o io/./prprf.o io/./prscanf.o io/./prstdio.o threads/./prcmon.o threads/./prrwlock.o threads/./prtpd.o linking/./prlink.o malloc/./prmalloc.o malloc/./prmem.o md/./prosdep.o memory/./prshm.o memory/./prshma.o memory/./prseg.o misc/./pralarm.o misc/./pratom.o misc/./prcountr.o misc/./prdtoa.o misc/./prenv.o misc/./prerr.o misc/./prerror.o misc/./prerrortable.o misc/./prinit.o misc/./prinrval.o misc/./pripc.o misc/./prlog2.o misc/./prlong.o misc/./prnetdb.o misc/./praton.o misc/./prolock.o misc/./prrng.o misc/./prsystem.o misc/./prthinfo.o misc/./prtpool.o misc/./prtrace.o misc/./prtime.o pthreads/./ptsynch.o pthreads/./ptio.o pthreads/./ptthread.o pthreads/./ptmisc.o md/unix/./unix.o md/unix/./unix_errors.o md/unix/./uxproces.o md/unix/./uxrng.o md/unix/./uxshm.o md/unix/./uxwrap.o md/unix/./linux.o md/unix/./os_Linux_x86_64.o 
ranlib libnspr4.a
rm -f libnspr4.so
gcc -shared -Wl,-soname -Wl,libnspr4.so -o libnspr4.so ./prvrsion.o io/./prfdcach.o io/./prmwait.o io/./prmapopt.o io/./priometh.o io/./pripv6.o io/./prlayer.o io/./prlog.o io/./prmmap.o io/./prpolevt.o io/./prprf.o io/./prscanf.o io/./prstdio.o threads/./prcmon.o threads/./prrwlock.o threads/./prtpd.o linking/./prlink.o malloc/./prmalloc.o malloc/./prmem.o md/./prosdep.o memory/./prshm.o memory/./prshma.o memory/./prseg.o misc/./pralarm.o misc/./pratom.o misc/./prcountr.o misc/./prdtoa.o misc/./prenv.o misc/./prerr.o misc/./prerror.o misc/./prerrortable.o misc/./prinit.o misc/./prinrval.o misc/./pripc.o misc/./prlog2.o misc/./prlong.o misc/./prnetdb.o misc/./praton.o misc/./prolock.o misc/./prrng.o misc/./prsystem.o misc/./prthinfo.o misc/./prtpool.o misc/./prtrace.o misc/./prtime.o pthreads/./ptsynch.o pthreads/./ptio.o pthreads/./ptthread.o pthreads/./ptmisc.o md/unix/./unix.o md/unix/./unix_errors.o md/unix/./uxproces.o md/unix/./uxrng.o md/unix/./uxshm.o md/unix/./uxwrap.o md/unix/./linux.o md/unix/./os_Linux_x86_64.o    -lpthread -ldl -lrt
../../config/./nsinstall -R -m 444 ./libnspr4.a ./libnspr4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
../../config/./nsinstall -R -m 444 ./libnspr4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src'
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr/src'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pr'
gmake -C lib export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib'
gmake -C ds export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/ds'
gcc -o plarena.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../pr/include  ../../../lib/ds/plarena.c
gcc -o plhash.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../pr/include  ../../../lib/ds/plhash.c
gcc -o plvrsion.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../pr/include  -I. ../../../lib/ds/plvrsion.c
../../../lib/ds/plvrsion.c: In function libVersionPoint:
../../../lib/ds/plvrsion.c:84:17: warning: variable dummy set but not used [-Wunused-but-set-variable]
rm -f libplds4.a
/usr/bin/ar cr libplds4.a ./plarena.o ./plhash.o ./plvrsion.o  
ranlib libplds4.a
rm -f libplds4.so
gcc -shared -Wl,-soname -Wl,libplds4.so -o libplds4.so ./plarena.o ./plhash.o ./plvrsion.o     -L/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnspr4
../../config/./nsinstall -R -m 444 ../../../lib/ds/plarenas.h ../../../lib/ds/plarena.h ../../../lib/ds/plhash.h /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include
../../config/./nsinstall -R -m 444 ./libplds4.a ./libplds4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
../../config/./nsinstall -R -m 444 ./libplds4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/ds'
gmake -C libc export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libc'
gmake -C include export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libc/include'
../../../config/./nsinstall -R -m 444 ../../../../lib/libc/include/plbase64.h ../../../../lib/libc/include/plstr.h ../../../../lib/libc/include/plgetopt.h ../../../../lib/libc/include/plerror.h /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libc/include'
gmake -C src export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libc/src'
gcc -o plvrsion.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include  -I. ../../../../lib/libc/src/plvrsion.c
../../../../lib/libc/src/plvrsion.c: In function libVersionPoint:
../../../../lib/libc/src/plvrsion.c:84:17: warning: variable dummy set but not used [-Wunused-but-set-variable]
gcc -o strlen.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include  ../../../../lib/libc/src/strlen.c
gcc -o strcpy.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include  ../../../../lib/libc/src/strcpy.c
gcc -o strdup.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include  ../../../../lib/libc/src/strdup.c
gcc -o strcase.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include  ../../../../lib/libc/src/strcase.c
gcc -o strcat.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include  ../../../../lib/libc/src/strcat.c
gcc -o strcmp.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include  ../../../../lib/libc/src/strcmp.c
gcc -o strchr.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include  ../../../../lib/libc/src/strchr.c
gcc -o strpbrk.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include  ../../../../lib/libc/src/strpbrk.c
gcc -o strstr.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include  ../../../../lib/libc/src/strstr.c
gcc -o strtok.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include  ../../../../lib/libc/src/strtok.c
gcc -o base64.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include  ../../../../lib/libc/src/base64.c
gcc -o plerror.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include  ../../../../lib/libc/src/plerror.c
gcc -o plgetopt.o -c -fvisibility=hidden     -Wall -pthread -g -fno-inline -fPIC  -UNDEBUG -DDEBUG_tinderbox  -DDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DLINUX=1 -DHAVE_LCHOWN=1 -DHAVE_STRERROR=1 -DHAVE_DLADDR=1 -D_REENTRANT=1  -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include  ../../../../lib/libc/src/plgetopt.c
rm -f libplc4.a
/usr/bin/ar cr libplc4.a ./plvrsion.o ./strlen.o ./strcpy.o ./strdup.o ./strcase.o ./strcat.o ./strcmp.o ./strchr.o ./strpbrk.o ./strstr.o ./strtok.o ./base64.o ./plerror.o ./plgetopt.o  
ranlib libplc4.a
rm -f libplc4.so
gcc -shared -Wl,-soname -Wl,libplc4.so -o libplc4.so ./plvrsion.o ./strlen.o ./strcpy.o ./strdup.o ./strcase.o ./strcat.o ./strcmp.o ./strchr.o ./strpbrk.o ./strstr.o ./strtok.o ./base64.o ./plerror.o ./plgetopt.o     -L/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnspr4
../../../config/./nsinstall -R -m 444 ./libplc4.a ./libplc4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
../../../config/./nsinstall -R -m 444 ./libplc4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libc/src'
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libc'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/nsprpub/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ'
gmake -C ../dbm export libs
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/dbm'
cd include; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/dbm/include'
Creating ../../../dist/public/dbm
../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 ../../../dbm/include/cdefs.h ../../../dbm/include/mcom_db.h ../../../dbm/include/ncompat.h ../../../dbm/include/winfile.h ../../../dist/public/dbm
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/dbm/include'
cd src; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/dbm/src'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/dbm/src'
cd include; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/dbm/include'
gmake[2]: Nothing to be done for `libs'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/dbm/include'
cd src; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/dbm/src'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/db.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/db.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/h_bigkey.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/h_bigkey.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/h_func.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/h_func.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/h_log2.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/h_log2.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/h_page.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/h_page.c
../../../dbm/src/h_page.c: In function __get_page:
../../../dbm/src/h_page.c:727:8: warning: variable is_little_endian set but not used [-Wunused-but-set-variable]
../../../dbm/src/h_page.c:732:8: warning: variable is_big_endian set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hash.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/hash.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hash_buf.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/hash_buf.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mktemp.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  ../../../dbm/src/mktemp.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dirent.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DHAVE_SYS_CDEFS_H -DMEMMOVE -D__DBINTERFACE_PRIVATE  -I../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../dist/public/dbm -I../../../dist/private/dbm -I../../../dbm/include  dirent.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libdbm.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libdbm.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/db.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/h_bigkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/h_func.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/h_log2.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/h_page.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hash.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hash_buf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mktemp.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dirent.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libdbm.a
../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libdbm.a ../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/dbm/src'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/dbm'
cd lib; gmake export
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib'
cd util; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/util'
Creating ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 base64.h ciferfam.h hasht.h nssb64.h nssb64t.h nsslocks.h nssilock.h nssilckt.h nssrwlk.h nssrwlkt.h nssutil.h pkcs11.h pkcs11f.h pkcs11p.h pkcs11t.h pkcs11n.h pkcs11u.h portreg.h secasn1.h secasn1t.h seccomon.h secder.h secdert.h secdig.h secdigt.h secitem.h secoid.h secoidt.h secport.h secerr.h utilmodt.h utilrename.h utilpars.h utilparst.h ../../../../dist/public/nss
Creating ../../../../dist/private/nss
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 templates.c ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/util'
cd freebl; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/freebl'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 blapit.h shsign.h ecl/ecl-exp.h nsslowhash.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 alghmac.h blapi.h secmpi.h secrng.h ec.h ecl/ecl.h ecl/ecl-curve.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/freebl'
cd sqlite; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/sqlite'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 sqlite3.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/sqlite'
cd softoken; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken'
cd legacydb; gmake export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken/legacydb'
There are no private exports.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken/legacydb'
cd legacydb; gmake private_export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken/legacydb'
There are no private exports.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken/legacydb'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 lgglue.h lowkeyi.h lowkeyti.h pkcs11ni.h softoken.h softoknt.h softkver.h sdb.h sftkdbt.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken'
cd base; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/base'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 nssbaset.h nssbase.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 baset.h base.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/base'
cd dev; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/dev'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 ckhelper.h devm.h devtm.h devt.h dev.h nssdevt.h nssdev.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/dev'
cd pki; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pki'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pki.h pkit.h nsspkit.h nsspki.h pkistore.h pki3hack.h pkitm.h pkim.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pki'
cd libpkix; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix'
cd include; gmake export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/include'
../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../../dist/private/nss
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/include'
cd pkix; gmake export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix'
cd certsel; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/certsel'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/certsel'
cd crlsel; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/crlsel'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/crlsel'
cd checker; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/checker'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/checker'
cd params; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/params'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/params'
cd results; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/results'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/results'
cd store; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/store'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/store'
cd top; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/top'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/top'
cd util; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/util'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/util'
cd certsel; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/certsel'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/certsel'
cd crlsel; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/crlsel'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/crlsel'
cd checker; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/checker'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/checker'
cd params; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/params'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/params'
cd results; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/results'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/results'
cd store; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/store'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/store'
cd top; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/top'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/top'
cd util; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/util'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/util'
There are no private exports.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix'
cd pkix_pl_nss; gmake export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
cd pki; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
cd module; gmake export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
cd pki; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
cd module; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
There are no private exports.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
cd include; gmake private_export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/include'
../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h ../../../../../dist/private/nss
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/include'
cd pkix; gmake private_export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix'
cd certsel; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/certsel'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/certsel'
cd crlsel; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/crlsel'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/crlsel'
cd checker; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/checker'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/checker'
cd params; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/params'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/params'
cd results; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/results'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/results'
cd store; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/store'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/store'
cd top; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/top'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/top'
cd util; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/util'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/util'
There are no private exports.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix'
cd pkix_pl_nss; gmake private_export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
cd pki; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
cd module; gmake private_export
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h ../../../../../../dist/private/nss
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
There are no private exports.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
There are no private exports.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix'
cd certdb; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/certdb'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 cert.h certt.h certdb.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 genname.h xconst.h certxutl.h certi.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/certdb'
cd certhigh; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/certhigh'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 ocsp.h ocspt.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 ocspti.h ocspi.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/certhigh'
cd pk11wrap; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pk11wrap'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 secmod.h secmodt.h secpkcs5.h pk11func.h pk11pub.h pk11priv.h pk11sdr.h pk11pqg.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 secmodi.h dev3hack.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pk11wrap'
cd cryptohi; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/cryptohi'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 cryptohi.h cryptoht.h key.h keyhi.h keyt.h keythi.h sechash.h ../../../../dist/public/nss
There are no private exports.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/cryptohi'
cd nss; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/nss'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 nss.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 nssrenam.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/nss'
cd ssl; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ssl'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 ssl.h sslt.h sslerr.h sslproto.h preenc.h ../../../../dist/public/nss
There are no private exports.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ssl'
cd pkcs12; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pkcs12'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 pkcs12t.h pkcs12.h p12plcy.h p12.h p12t.h ../../../../dist/public/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pkcs12'
cd pkcs7; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pkcs7'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 secmime.h secpkcs7.h pkcs7t.h ../../../../dist/public/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pkcs7'
cd smime; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/smime'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 cms.h cmst.h smime.h cmsreclist.h ../../../../dist/public/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/smime'
cd crmf; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/crmf'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 crmf.h crmft.h cmmf.h cmmft.h ../../../../dist/public/nss
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 crmfi.h crmfit.h cmmfi.h cmmfit.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/crmf'
cd jar; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/jar'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 jar.h jar-ds.h jarfile.h ../../../../dist/public/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/jar'
cd ckfw; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw'
cd builtins; gmake export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw/builtins'
../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 nssckbi.h ../../../../../dist/public/nss
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw/builtins'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 nssck.api nssckepv.h nssckft.h nssckfw.h nssckfwc.h nssckfwt.h nssckg.h nssckmdt.h nssckt.h ../../../../dist/public/nss
cd builtins; gmake private_export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw/builtins'
There are no private exports.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw/builtins'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 ck.h ckfw.h ckfwm.h ckfwtm.h ckmd.h ckt.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw'
cd sysinit; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/sysinit'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/sysinit'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib'
cd cmd; gmake export
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd'
cd lib; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/lib'
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 444 basicutil.h secutil.h pk11table.h ../../../../dist/private/nss
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/lib'
cd addbuiltin; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/addbuiltin'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/addbuiltin'
cd atob; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/atob'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/atob'
cd bltest; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/bltest'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/bltest'
cd btoa; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/btoa'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/btoa'
cd certcgi; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/certcgi'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/certcgi'
cd certutil; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/certutil'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/certutil'
cd checkcert; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/checkcert'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/checkcert'
cd chktest; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/chktest'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/chktest'
cd crlutil; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/crlutil'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/crlutil'
cd crmftest; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/crmftest'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/crmftest'
cd dbtest; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/dbtest'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/dbtest'
cd derdump; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/derdump'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/derdump'
cd digest; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/digest'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/digest'
cd httpserv; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/httpserv'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/httpserv'
cd fipstest; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/fipstest'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/fipstest'
cd lowhashtest; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/lowhashtest'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/lowhashtest'
cd listsuites; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/listsuites'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/listsuites'
cd makepqg; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/makepqg'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/makepqg'
cd multinit; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/multinit'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/multinit'
cd ocspclnt; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ocspclnt'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ocspclnt'
cd ocspresp; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ocspresp'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ocspresp'
cd oidcalc; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/oidcalc'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/oidcalc'
cd p7content; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7content'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7content'
cd p7env; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7env'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7env'
cd p7sign; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7sign'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7sign'
cd p7verify; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7verify'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7verify'
cd pk12util; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk12util'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk12util'
cd pk11mode; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk11mode'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk11mode'
cd pk1sign; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk1sign'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk1sign'
cd pkix-errcodes; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pkix-errcodes'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pkix-errcodes'
cd pp; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pp'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pp'
cd pwdecrypt; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pwdecrypt'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pwdecrypt'
cd rsaperf; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/rsaperf'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/rsaperf'
cd sdrtest; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/sdrtest'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/sdrtest'
cd selfserv; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/selfserv'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/selfserv'
cd signtool; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/signtool'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/signtool'
cd signver; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/signver'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/signver'
cd shlibsign; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign'
cd mangle; gmake export
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/mangle'
gmake[3]: Nothing to be done for `export'.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/mangle'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign'
cd smimetools; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/smimetools'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/smimetools'
cd ssltap; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ssltap'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ssltap'
cd strsclnt; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/strsclnt'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/strsclnt'
cd symkeyutil; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/symkeyutil'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/symkeyutil'
cd tests; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/tests'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/tests'
cd tstclnt; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/tstclnt'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/tstclnt'
cd vfychain; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/vfychain'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/vfychain'
cd vfyserv; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/vfyserv'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/vfyserv'
cd modutil; gmake export
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/modutil'
gmake[2]: Nothing to be done for `export'.
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/modutil'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd'
cd lib; gmake libs
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib'
cd util; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/util'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/quickder.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  quickder.c
quickder.c: In function DecodeItem:
quickder.c:611:12: warning: variable optional set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secdig.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secdig.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derdec.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  derdec.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derenc.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  derenc.c
derenc.c: In function der_encode:
derenc.c:282:22: warning: variable optional set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dersubr.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  dersubr.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dertime.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  dertime.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/errstrs.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  errstrs.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssb64d.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  nssb64d.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssb64e.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  nssb64e.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssrwlk.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  nssrwlk.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssilock.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  nssilock.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/oidstring.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  oidstring.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/portreg.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  portreg.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secalgid.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secalgid.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secasn1d.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secasn1d.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secasn1e.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secasn1e.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secasn1u.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secasn1u.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secitem.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secitem.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secload.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secload.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secoid.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secoid.c
secoid.c: In function secoid_HashNumber:
secoid.c:1866:12: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
secoid.c: In function SECOID_Init:
secoid.c:1907:19: warning: variable c set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sectime.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sectime.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secport.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secport.c
secport.c: In function port_ArenaRelease:
secport.c:431:29: warning: variable tm set but not used [-Wunused-but-set-variable]
secport.c: In function PORT_ArenaUnmark_Util:
secport.c:501:25: warning: variable tm set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/templates.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  templates.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utf8.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  utf8.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utilmod.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  utilmod.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utilpars.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  utilpars.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssutil.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssutil.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/quickder.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secdig.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derdec.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derenc.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dersubr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dertime.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/errstrs.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssb64d.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssb64e.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssrwlk.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssilock.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/oidstring.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/portreg.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secalgid.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secasn1d.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secasn1e.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secasn1u.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secitem.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secload.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secoid.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sectime.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secport.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/templates.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utf8.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utilmod.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utilpars.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssutil.a
grep -v ';-' nssutil.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssutil.def
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssutil3.so
gcc -shared  -Wl,-z,defs -Wl,-soname -Wl,libnssutil3.so  -Wl,--version-script,Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssutil.def -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssutil3.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/quickder.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secdig.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derdec.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derenc.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dersubr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dertime.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/errstrs.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssb64d.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssb64e.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssrwlk.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssilock.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/oidstring.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/portreg.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secalgid.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secasn1d.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secasn1e.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secasn1u.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secitem.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secload.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secoid.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sectime.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secport.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/templates.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utf8.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utilmod.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utilpars.o    -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssutil3.so
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssutil.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssutil3.so ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/util'
cd freebl; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/freebl'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/loader.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  loader.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libfreebl.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libfreebl.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/loader.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libfreebl.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libfreebl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
mkdir Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB
gmake FREEBL_CHILD_BUILD=1 \
 OBJDIR=Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB libs
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/freebl'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/freeblver.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  freeblver.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ldvector.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ldvector.c
ldvector.c: In function FREEBL_GetVector:
ldvector.c:273:19: warning: variable c set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/sysrand.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  sysrand.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/sha_fast.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  sha_fast.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/md2.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  md2.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/md5.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  md5.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/sha512.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  sha512.c
sha512.c: In function SHA512_Compress:
sha512.c:895:14: warning: unused variable t1 [-Wunused-variable]
sha512.c: In function SHA512_End:
sha512.c:1190:14: warning: unused variable t1 [-Wunused-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/alghmac.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  alghmac.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/rawhash.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  rawhash.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/alg2268.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  alg2268.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/arcfour.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  arcfour.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/arcfive.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  arcfive.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/desblapi.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  -fno-strict-aliasing desblapi.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/des.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  des.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/drbg.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  drbg.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/cts.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  cts.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ctr.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ctr.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/gcm.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  gcm.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/rijndael.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  rijndael.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  aeskeywrap.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/camellia.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  camellia.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/dh.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  dh.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ec.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/pqg.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  pqg.c
pqg.c: In function pqg_ParamGen:
pqg.c:1234:18: warning: variable b set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/dsa.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  dsa.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/rsa.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  rsa.c
rsa.c: In function get_blinding_params:
rsa.c:1098:26: warning: variable prevbp set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/shvfy.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  shvfy.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  tlsprfalg.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/seed.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  seed.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/jpake.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  jpake.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mpprime.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mpprime.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mpmontg.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mpmontg.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mplogic.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mplogic.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mpi.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mpi.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mp_gf2m.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mpi_amd64.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mpi_amd64.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mp_comba.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mp_comba.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  mpi/mpcpucache.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecl.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecl.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecl_curve.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecl_curve.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecl_mult.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecl_mult.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecl_gf.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecl_gf.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_aff.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_aff.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_jac.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_jac.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_mont.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_mont.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec_naf.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ec_naf.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_jm.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_jm.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec2_aff.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ec2_aff.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec2_mont.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ec2_mont.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec2_proj.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ec2_proj.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec2_163.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ec2_163.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec2_193.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ec2_193.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec2_233.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ec2_233.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_192.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_192.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_224.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_224.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_256.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_256.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_384.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_384.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_521.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  ecl/ecp_521.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/stubs.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  stubs.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/nsslowhash.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  nsslowhash.c
nsslowhash.c: In function NSSLOW_Init:
nsslowhash.c:292:12: warning: variable nsprAvailable set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/arcfour-amd64-gas.o -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  -march=opteron -m64 -fPIC -Wa,--noexecstack -c arcfour-amd64-gas.s
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mpi_amd64_gas.o -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  -march=opteron -m64 -fPIC -Wa,--noexecstack -c mpi/mpi_amd64_gas.s
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/intel-aes.o -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_64 -DFREEBL_NO_DEPEND -DNSS_X86_OR_X64 -DNSS_X64 -DNSS_BEVAND_ARCFOUR -DMPI_AMD64 -DMP_ASSEMBLY_MULTIPLY -DNSS_USE_COMBA -DMP_CHAR_STORE_SLOW -DMP_IS_LITTLE_ENDIAN -DUSE_HW_AES -DMP_API_COMPATIBLE -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -Impi -Iecl  -march=opteron -m64 -fPIC -Wa,--noexecstack -c intel-aes.s
grep -v ';-' freebl_hash.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/freebl.def
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so
gcc -shared  -Wl,-z,defs -Wl,-soname -Wl,libfreebl3.so  -Wl,--version-script,Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/freebl.def -Wl,-Bsymbolic -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/freeblver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ldvector.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/sysrand.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/sha_fast.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/md2.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/md5.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/sha512.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/alghmac.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/rawhash.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/alg2268.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/arcfour.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/arcfive.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/desblapi.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/des.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/drbg.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/cts.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ctr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/gcm.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/rijndael.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/camellia.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/dh.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/pqg.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/dsa.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/rsa.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/shvfy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/seed.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/jpake.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mpprime.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mpmontg.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mplogic.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mpi.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mpi_amd64.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mp_comba.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecl.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecl_curve.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecl_mult.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecl_gf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_aff.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_jac.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_mont.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec_naf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_jm.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec2_aff.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec2_mont.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec2_proj.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec2_163.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec2_193.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ec2_233.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_192.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_224.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_256.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_384.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/ecp_521.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/stubs.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/nsslowhash.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/arcfour-amd64-gas.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/mpi_amd64_gas.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/intel-aes.o      -ldl -lc
chmod +x Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/freebl'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/freebl'
cd sqlite; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/sqlite'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sqlite3.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSQLITE_THREADSAFE=1 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sqlite3.c
sqlite3.c: In function pagerPagecount:
sqlite3.c:39133:7: warning: variable rc set but not used [-Wunused-but-set-variable]
sqlite3.c: In function balance_nonroot:
sqlite3.c:43586:11: warning: variable t set but not used [-Wunused-but-set-variable]
sqlite3.c: In function sqlite3ValueText:
sqlite3.c:46992:32: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
sqlite3.c: In function sqlite3VdbeAddOp4Int:
sqlite3.c:47358:33: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
sqlite3.c: In function sqlite3VdbeChangeP4:
sqlite3.c:47872:18: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
sqlite3.c: In function sqlite3VdbeRecordUnpack:
sqlite3.c:49877:17: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
sqlite3.c: In function columnMem:
sqlite3.c:50866:7: warning: variable vals set but not used [-Wunused-but-set-variable]
sqlite3.c: In function sqlite3_blob_open:
sqlite3.c:58242:40: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
sqlite3.c: In function sqlite3DeleteIndex:
sqlite3.c:66581:10: warning: variable pOld set but not used [-Wunused-but-set-variable]
sqlite3.c: In function sqlite3RefillIndex:
sqlite3.c:68544:29: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
sqlite3.c: In function sqlite3CommitTransaction:
sqlite3.c:69556:12: warning: variable db set but not used [-Wunused-but-set-variable]
sqlite3.c: In function sqlite3RollbackTransaction:
sqlite3.c:69576:12: warning: variable db set but not used [-Wunused-but-set-variable]
sqlite3.c: In function trimFunc:
sqlite3.c:72032:14: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
sqlite3.c: In function sqlite3FkCheck:
sqlite3.c:73225:9: warning: variable v set but not used [-Wunused-but-set-variable]
sqlite3.c: In function sqlite3OpenTable:
sqlite3.c:73762:31: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
sqlite3.c: In function sqlite3Insert:
sqlite3.c:74197:7: warning: variable regRecord set but not used [-Wunused-but-set-variable]
sqlite3.c: In function sqlite3GenerateConstraintChecks:
sqlite3.c:75068:35: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
sqlite3.c: In function sqlite3_get_table:
sqlite3.c:83425:22: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
sqlite3.c: In function sqlite3_free_table:
sqlite3.c:83469:10: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
sqlite3.c: In function sqlite3Update:
sqlite3.c:84700:7: warning: variable regRec set but not used [-Wunused-but-set-variable]
sqlite3.c: In function codeOneLoopStart:
sqlite3.c:89777:16: warning: variable pFinal set but not used [-Wunused-but-set-variable]
sqlite3.c: In function sqlite3WhereBegin:
sqlite3.c:90410:30: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
sqlite3.c: In function sqlite3Parser:
sqlite3.c:93894:7: warning: variable yyendofinput set but not used [-Wunused-but-set-variable]
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsqlite.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsqlite.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sqlite3.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsqlite.a
grep -v ';-' sqlite.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sqlite.def
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsqlite3.so
gcc -shared  -Wl,-z,defs -Wl,-soname -Wl,libsqlite3.so  -Wl,--version-script,Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sqlite.def -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsqlite3.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sqlite3.o     -lpthread  -ldl -lc
chmod +x Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsqlite3.so
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsqlite.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsqlite3.so ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/sqlite'
cd softoken; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ecdecode.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ecdecode.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipsaudt.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  fipsaudt.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  fipstest.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstokn.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  fipstokn.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgglue.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  lgglue.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowkey.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  lowkey.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowpbe.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  lowpbe.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/padbuf.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  padbuf.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkcs11.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pkcs11.c
pkcs11.c: In function sftk_HashNumber:
pkcs11.c:2135:12: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
pkcs11.c: In function NSC_GetInfo:
pkcs11.c:3059:19: warning: variable c set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkcs11c.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pkcs11c.c
pkcs11c.c: In function NSC_GenerateKeyPair:
pkcs11c.c:3836:9: warning: variable private_value_bits set but not used [-Wunused-but-set-variable]
pkcs11c.c: In function sftk_PackagePrivateKey:
pkcs11c.c:4358:14: warning: variable fordebug set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkcs11u.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pkcs11u.c
pkcs11u.c: In function sftk_NewTokenObject:
pkcs11u.c:1902:22: warning: variable tokObject set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/rsawrapr.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  rsawrapr.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sdb.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sdb.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sftkdb.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sftkdb.c
sftkdb.c: In function sftkdb_fixupTemplateOut:
sftkdb.c:328:22: warning: variable data set but not used [-Wunused-but-set-variable]
sftkdb.c: In function sftkdb_CreateObject:
sftkdb.c:576:12: warning: variable inTransaction set but not used [-Wunused-but-set-variable]
sftkdb.c: In function sftkdb_handleIDAndName:
sftkdb.c:2014:11: warning: variable crv set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sftkpars.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sftkpars.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sftkpwd.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sftkpwd.c
sftkpwd.c: In function sftk_updateMacs:
sftkpwd.c:868:11: warning: variable crv2 set but not used [-Wunused-but-set-variable]
sftkpwd.c:867:11: warning: variable crv set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/softkver.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  softkver.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tlsprf.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  tlsprf.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jpakesftk.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jpakesftk.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsoftokn.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsoftokn.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ecdecode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipsaudt.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstokn.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgglue.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowpbe.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/padbuf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkcs11.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkcs11c.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkcs11u.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/rsawrapr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sftkdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sftkpars.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sftkpwd.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/softkver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tlsprf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jpakesftk.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsoftokn.a
grep -v ';-' softokn.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/softokn.def
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsoftokn3.so
gcc -shared  -Wl,-z,defs -Wl,-soname -Wl,libsoftokn3.so  -Wl,--version-script,Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/softokn.def -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsoftokn3.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ecdecode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipsaudt.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstokn.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgglue.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowpbe.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/padbuf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkcs11.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkcs11c.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkcs11u.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/rsawrapr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sftkdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sftkpars.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sftkpwd.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/softkver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tlsprf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jpakesftk.o   ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lsqlite3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsoftokn3.so
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsoftokn.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsoftokn3.so ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
cd legacydb; gmake libs
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken/legacydb'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dbmshim.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  dbmshim.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/keydb.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  keydb.c
keydb.c: In function seckey_encrypt_private_key:
keydb.c:1480:14: warning: variable fordebug set but not used [-Wunused-but-set-variable]
keydb.c: In function seckey_decrypt_private_key:
keydb.c:1709:14: warning: variable fordebug set but not used [-Wunused-but-set-variable]
keydb.c: In function encodePWCheckEntry:
keydb.c:1994:15: warning: variable rv set but not used [-Wunused-but-set-variable]
keydb.c: In function nsslowkey_ResetKeyDB:
keydb.c:2036:9: warning: variable ret set but not used [-Wunused-but-set-variable]
keydb.c: In function keydb_Get:
keydb.c:2093:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
keydb.c: In function keydb_Put:
keydb.c:2111:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
keydb.c: In function keydb_Sync:
keydb.c:2129:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
keydb.c: In function keydb_Del:
keydb.c:2147:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
keydb.c: In function keydb_Seq:
keydb.c:2165:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
keydb.c: In function keydb_Close:
keydb.c:2183:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgattr.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lgattr.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgcreate.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lgcreate.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgdestroy.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lgdestroy.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgfind.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lgfind.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lginit.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lginit.c
lginit.c: In function lg_HashNumber:
lginit.c:486:12: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
lginit.c: In function lg_CompareValues:
lginit.c:492:27: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
lginit.c:493:27: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
lginit.c: In function legacy_Open:
lginit.c:597:19: warning: variable c set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lgutil.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowcert.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lowcert.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowkey.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  lowkey.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pcertdb.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  pcertdb.c
pcertdb.c: In function certdb_Get:
pcertdb.c:229:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
pcertdb.c: In function certdb_Put:
pcertdb.c:245:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
pcertdb.c: In function certdb_Sync:
pcertdb.c:261:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
pcertdb.c: In function certdb_Del:
pcertdb.c:278:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
pcertdb.c: In function certdb_Seq:
pcertdb.c:299:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
pcertdb.c: In function certdb_Close:
pcertdb.c:315:14: warning: variable prstat set but not used [-Wunused-but-set-variable]
pcertdb.c: In function NewDBSubjectEntry:
pcertdb.c:2435:18: warning: variable eaddrlen set but not used [-Wunused-but-set-variable]
pcertdb.c: In function UpdateV6DB:
pcertdb.c:3591:15: warning: variable rv set but not used [-Wunused-but-set-variable]
pcertdb.c: In function UpdateV5DB:
pcertdb.c:3796:15: warning: variable rv set but not used [-Wunused-but-set-variable]
pcertdb.c: In function nsslowcert_FindCrlByKey:
pcertdb.c:5075:9: warning: variable key set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11db.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/dbm  pk11db.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdbm.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdbm.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dbmshim.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/keydb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgattr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgcreate.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgdestroy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgfind.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lginit.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowcert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pcertdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11db.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdbm.a
grep -v ';-' nssdbm.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssdbm.def
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdbm3.so
gcc -shared  -Wl,-z,defs -Wl,-soname -Wl,libnssdbm3.so  -Wl,--version-script,Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssdbm.def -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdbm3.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dbmshim.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/keydb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgattr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgcreate.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgdestroy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgfind.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lginit.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lgutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowcert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pcertdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11db.o   ../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl.a ../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libdbm.a  -L../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -L../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdbm3.so
../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdbm.a ../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdbm3.so ../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken/legacydb'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/softoken'
cd base; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/base'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/arena.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  arena.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/error.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  error.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/errorval.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  errorval.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hashops.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  hashops.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libc.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  libc.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tracker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  tracker.c
tracker.c: In function identity_hash:
tracker.c:36:10: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/item.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  item.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utf8.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  utf8.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/list.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  list.c
list.c: In function nssList_Add:
list.c:224:14: warning: variable nssrv set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hash.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  hash.c
hash.c: In function nss_identity_hash:
hash.c:58:16: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssb.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssb.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/arena.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/error.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/errorval.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hashops.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libc.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tracker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/item.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utf8.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/list.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hash.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssb.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/base'
cd dev; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/dev'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/devslot.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  devslot.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/devtoken.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  devtoken.c
devtoken.c: In function nssToken_TraverseCertificates:
devtoken.c:1473:14: warning: variable status set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/devutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  devutil.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ckhelper.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  ckhelper.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdev.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdev.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/devslot.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/devtoken.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/devutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ckhelper.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdev.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdev.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/dev'
cd pki; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pki'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/asymmkey.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  asymmkey.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certificate.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  certificate.c
certificate.c: In function nssCertificateList_DoCallback:
certificate.c:902:14: warning: variable nssrv set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cryptocontext.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  cryptocontext.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/symmkey.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  symmkey.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/trustdomain.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  trustdomain.c
trustdomain.c: In function NSSTrustDomain_TraverseCertificates:
trustdomain.c:1002:14: warning: variable status set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tdcache.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  tdcache.c
tdcache.c: In function merge_object_instances:
tdcache.c:704:49: warning: comparison between PRStatus and enum _SECStatus [-Wenum-compare]
tdcache.c: In function add_cert_to_cache:
tdcache.c:776:9: warning: variable handle set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certdecode.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  certdecode.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkistore.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  pkistore.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkibase.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  pkibase.c
pkibase.c: In function nssPKIObjectCollection_Traverse:
pkibase.c:910:14: warning: variable status set but not used [-Wunused-but-set-variable]
pkibase.c: In function nssCertificateCollection_Create:
pkibase.c:1064:14: warning: variable status set but not used [-Wunused-but-set-variable]
pkibase.c: In function nssCRLCollection_Create:
pkibase.c:1171:14: warning: variable status set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pki3hack.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  pki3hack.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsspki.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsspki.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/asymmkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certificate.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cryptocontext.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/symmkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/trustdomain.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tdcache.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certdecode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkistore.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkibase.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pki3hack.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsspki.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pki'
cd libpkix; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix'
cd include; gmake libs
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/include'
gmake[3]: Nothing to be done for `libs'.
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/include'
cd pkix; gmake libs
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix'
cd certsel; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/certsel'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_certselector.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_certselector.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_comcertselparams.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_comcertselparams.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixcertsel.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixcertsel.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_certselector.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_comcertselparams.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixcertsel.a
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixcertsel.a ../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/certsel'
cd crlsel; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/crlsel'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_crlselector.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_crlselector.c
pkix_crlselector.c: In function pkix_CRLSelector_Hashcode:
pkix_crlselector.c:193:22: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_comcrlselparams.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_comcrlselparams.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixcrlsel.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixcrlsel.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_crlselector.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_comcrlselparams.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixcrlsel.a
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixcrlsel.a ../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/crlsel'
cd checker; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/checker'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_basicconstraintschecker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_basicconstraintschecker.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_certchainchecker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_certchainchecker.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_crlchecker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_crlchecker.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_ekuchecker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_ekuchecker.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_expirationchecker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_expirationchecker.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_namechainingchecker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_namechainingchecker.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_nameconstraintschecker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_nameconstraintschecker.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_ocspchecker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_ocspchecker.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_revocationmethod.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_revocationmethod.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_revocationchecker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_revocationchecker.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_policychecker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_policychecker.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_signaturechecker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_signaturechecker.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_targetcertchecker.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_targetcertchecker.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixchecker.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixchecker.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_basicconstraintschecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_certchainchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_crlchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_ekuchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_expirationchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_namechainingchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_nameconstraintschecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_ocspchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_revocationmethod.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_revocationchecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_policychecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_signaturechecker.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_targetcertchecker.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixchecker.a
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixchecker.a ../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/checker'
cd params; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/params'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_trustanchor.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_trustanchor.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_procparams.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_procparams.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_valparams.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_valparams.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_resourcelimits.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_resourcelimits.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixparams.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixparams.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_trustanchor.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_procparams.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_valparams.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_resourcelimits.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixparams.a
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixparams.a ../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/params'
cd results; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/results'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_buildresult.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_buildresult.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_policynode.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_policynode.c
pkix_policynode.c: In function pkix_PolicyNode_Hashcode:
pkix_policynode.c:827:34: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_valresult.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_valresult.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_verifynode.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_verifynode.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixresults.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixresults.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_buildresult.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_policynode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_valresult.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_verifynode.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixresults.a
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixresults.a ../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/results'
cd store; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/store'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_store.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_store.c
pkix_store.c: In function pkix_CertStore_Hashcode:
pkix_store.c:77:22: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
pkix_store.c:78:22: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
pkix_store.c:79:22: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
pkix_store.c:80:22: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
pkix_store.c:81:22: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixstore.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixstore.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_store.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixstore.a
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixstore.a ../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/store'
cd top; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/top'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_validate.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_validate.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_lifecycle.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_lifecycle.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_build.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_build.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixtop.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixtop.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_validate.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_lifecycle.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_build.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixtop.a
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixtop.a ../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/top'
cd util; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/util'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_tools.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_tools.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_error.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_error.c
pkix_error.c: In function pkix_Error_Hashcode:
pkix_error.c:328:20: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_logger.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_logger.c
pkix_logger.c: In function pkix_Logger_Hashcode:
pkix_logger.c:495:20: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_list.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_list.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_errpaths.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_errpaths.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixutil.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixutil.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_tools.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_error.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_logger.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_list.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_errpaths.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixutil.a
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixutil.a ../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix/util'
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix'
cd pkix_pl_nss; gmake libs
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
cd pki; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_basicconstraints.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_basicconstraints.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_cert.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_cert.c
pkix_pl_cert.c: In function PKIX_PL_Cert_Create:
pkix_pl_cert.c:1518:22: warning: variable copyDER set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_certpolicyinfo.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_certpolicyinfo.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_certpolicymap.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_certpolicymap.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_certpolicyqualifier.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_certpolicyqualifier.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_crl.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_crl.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_crldp.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_crldp.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_crlentry.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_crlentry.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_date.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_date.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_generalname.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_generalname.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_infoaccess.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_infoaccess.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_nameconstraints.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_nameconstraints.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ocsprequest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ocsprequest.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ocspresponse.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ocspresponse.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_publickey.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_publickey.c
pkix_pl_publickey.c: In function pkix_pl_PublicKey_Hashcode:
pkix_pl_publickey.c:214:21: warning: variable fullHash set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_x500name.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_x500name.c
pkix_pl_x500name.c:37:1: warning: pkix_pl_X500Name_ToString_Helper defined but not used [-Wunused-function]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ocspcertid.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ocspcertid.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixpki.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixpki.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_basicconstraints.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_cert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_certpolicyinfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_certpolicymap.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_certpolicyqualifier.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_crl.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_crldp.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_crlentry.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_date.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_generalname.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_infoaccess.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_nameconstraints.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ocsprequest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ocspresponse.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_publickey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_x500name.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ocspcertid.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixpki.a
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixpki.a ../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_bigint.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_bigint.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_bytearray.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_bytearray.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_common.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_common.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_error.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_error.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_hashtable.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_hashtable.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_lifecycle.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_lifecycle.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_mem.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_mem.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_monitorlock.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_monitorlock.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_mutex.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_mutex.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_object.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_object.c
pkix_pl_object.c: In function pkix_pl_Object_Hashcode_Default:
pkix_pl_object.c:374:19: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_oid.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_oid.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_primhash.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_primhash.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_rwlock.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_rwlock.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_string.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_string.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixsystem.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixsystem.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_bigint.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_bytearray.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_common.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_error.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_hashtable.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_lifecycle.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_mem.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_monitorlock.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_mutex.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_object.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_oid.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_primhash.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_rwlock.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_string.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixsystem.a
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixsystem.a ../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/system'
cd module; gmake libs
gmake[4]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_aiamgr.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_aiamgr.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_colcertstore.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_colcertstore.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_httpcertstore.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_httpcertstore.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_httpdefaultclient.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_httpdefaultclient.c
pkix_pl_httpdefaultclient.c: In function pkix_pl_HttpDefaultClient_KeepAliveSession:
pkix_pl_httpdefaultclient.c:1135:36: warning: variable client set but not used [-Wunused-but-set-variable]
pkix_pl_httpdefaultclient.c: In function pkix_pl_HttpDefaultClient_Cancel:
pkix_pl_httpdefaultclient.c:1487:36: warning: variable client set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldaptemplates.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ldaptemplates.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldapcertstore.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ldapcertstore.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldapresponse.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ldapresponse.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldaprequest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ldaprequest.c
pkix_pl_ldaprequest.c: In function pkix_pl_LdapRequest_Destroy:
pkix_pl_ldaprequest.c:266:30: warning: variable ldapRq set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldapdefaultclient.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_ldapdefaultclient.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_nsscontext.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_nsscontext.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_pk11certstore.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_pk11certstore.c
pkix_pl_pk11certstore.c: In function NameCacheHasFetchedCrlInfo:
pkix_pl_pk11certstore.c:382:22: warning: variable cert set but not used [-Wunused-but-set-variable]
pkix_pl_pk11certstore.c: In function DownloadCrl:
pkix_pl_pk11certstore.c:782:16: warning: variable savedError set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_socket.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../../dist/public/nss -I../../../../../../dist/private/nss  pkix_pl_socket.c
pkix_pl_socket.c: In function pkix_pl_socket_timestamp:
pkix_pl_socket.c:65:9: warning: format %lld expects argument of type long long int, but argument 2 has type PRInt64 [-Wformat]
pkix_pl_socket.c: In function pkix_pl_socket_traceLine:
pkix_pl_socket.c:143:35: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
pkix_pl_socket.c: In function pkix_pl_socket_tracePartialLine:
pkix_pl_socket.c:187:43: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
pkix_pl_socket.c: In function pkix_pl_socket_tracebuff:
pkix_pl_socket.c:246:43: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixmodule.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixmodule.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_aiamgr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_colcertstore.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_httpcertstore.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_httpdefaultclient.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldaptemplates.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldapcertstore.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldapresponse.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldaprequest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldapdefaultclient.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_nsscontext.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_pk11certstore.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_socket.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixmodule.a
../../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkixmodule.a ../../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[4]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss/module'
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix/pkix_pl_nss'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/libpkix'
cd certdb; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/certdb'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/alg1485.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  alg1485.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certdb.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certdb.c
certdb.c: In function cert_VerifySubjectAltName:
certdb.c:1426:18: warning: variable hnLen set but not used [-Wunused-but-set-variable]
certdb.c: In function CERT_ImportCerts:
certdb.c:2435:15: warning: variable rv set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certv3.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certv3.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certxutl.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certxutl.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crl.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crl.c
crl.c: In function crl_storeCRL:
crl.c:632:15: warning: variable rv set but not used [-Wunused-but-set-variable]
crl.c: In function cert_CheckCertRevocationStatus:
crl.c:2634:25: warning: comparison between enum _SECStatus and SECCertTimeValidity [-Wenum-compare]
crl.c:2690:27: warning: unused variable rv2 [-Wunused-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/genname.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  genname.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/stanpcertdb.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  stanpcertdb.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/polcyxtn.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  polcyxtn.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secname.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secname.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xauthkid.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  xauthkid.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xbsconst.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  xbsconst.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xconst.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  xconst.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcertdb.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcertdb.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/alg1485.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certv3.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certxutl.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crl.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/genname.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/stanpcertdb.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/polcyxtn.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secname.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xauthkid.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xbsconst.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xconst.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcertdb.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcertdb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/certdb'
cd certhigh; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/certhigh'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certhtml.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certhtml.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certreq.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certreq.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlv2.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crlv2.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocsp.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ocsp.c
ocsp.c: In function CERT_EncodeOCSPRequest:
ocsp.c:1437:21: warning: variable tbsRequest set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspsig.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ocspsig.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certhigh.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certhigh.c
certhigh.c: In function CERT_MatchNickname:
certhigh.c:28:9: warning: variable len set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certvfy.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certvfy.c
certvfy.c: In function cert_VerifyCertChainOld:
certvfy.c:504:102: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
certvfy.c:568:103: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
certvfy.c:596:100: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
certvfy.c:624:99: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
certvfy.c: In function CERT_VerifyCACertForUsage:
certvfy.c:839:90: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
certvfy.c:864:90: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
certvfy.c: In function CERT_VerifyCertificate:
certvfy.c:1160:97: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
certvfy.c:1167:97: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
certvfy.c:1176:90: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
certvfy.c: In function CERT_VerifyCert:
certvfy.c:1298:86: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
certvfy.c:1302:86: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
certvfy.c:1308:86: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certvfypkix.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certvfypkix.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certvfypkixprint.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certvfypkixprint.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xcrldist.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  xcrldist.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcerthi.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcerthi.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certhtml.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certreq.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlv2.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocsp.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspsig.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certhigh.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certvfy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certvfypkix.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certvfypkixprint.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xcrldist.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcerthi.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/certhigh'
cd pk11wrap; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pk11wrap'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dev3hack.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  dev3hack.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11akey.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11akey.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11auth.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11auth.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11cert.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11cert.c
pk11cert.c: In function pk11_fastCert:
pk11cert.c:231:14: warning: variable status set but not used [-Wunused-but-set-variable]
pk11cert.c: In function PK11_MakeCertFromHandle:
pk11cert.c:297:12: warning: variable swapNickname set but not used [-Wunused-but-set-variable]
pk11cert.c:296:12: warning: variable isFortezzaRootCA set but not used [-Wunused-but-set-variable]
pk11cert.c: In function PK11_TraverseCertsForNicknameInSlot:
pk11cert.c:2002:28: warning: variable pk11cb set but not used [-Wunused-but-set-variable]
pk11cert.c: In function PK11_FindCertFromDERCertItem:
pk11cert.c:2146:21: warning: unused variable td [-Wunused-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11cxt.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11cxt.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11err.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11err.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11kea.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11kea.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11list.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11list.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11load.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11load.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11mech.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11mech.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11merge.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11merge.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11nobj.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11nobj.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11obj.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11obj.c
pk11obj.c: In function PK11_MatchItem:
pk11obj.c:1604:22: warning: variable parent set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pars.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11pars.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pbe.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11pbe.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pk12.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11pk12.c
pk11pk12.c: In function PK11_ImportPrivateKeyInfoAndReturnKey:
pk11pk12.c:424:17: warning: variable keyType set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pqg.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11pqg.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11sdr.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11sdr.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11skey.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11skey.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11slot.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11slot.c
pk11slot.c: In function PK11_InitToken:
pk11slot.c:1101:11: warning: variable tmp set but not used [-Wunused-but-set-variable]
pk11slot.c: In function PK11_InitSlot:
pk11slot.c:1345:11: warning: variable tmp set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11util.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11util.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpk11wrap.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpk11wrap.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dev3hack.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11akey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11auth.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11cert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11cxt.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11err.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11kea.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11list.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11load.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11mech.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11merge.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11nobj.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11obj.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pars.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pbe.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pk12.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pqg.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11sdr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11skey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11slot.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11util.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpk11wrap.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pk11wrap'
cd cryptohi; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/cryptohi'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sechash.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sechash.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/seckey.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  seckey.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secsign.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secsign.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secvfy.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secvfy.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dsautil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  dsautil.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcryptohi.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcryptohi.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sechash.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/seckey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secsign.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secvfy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dsautil.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcryptohi.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcryptohi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/cryptohi'
cd nss; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/nss'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssinit.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  nssinit.c
nssinit.c: In function NSS_VersionCheck:
nssinit.c:1251:19: warning: variable c set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssver.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  nssver.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utilwrap.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  utilwrap.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnss.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnss.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssinit.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utilwrap.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnss.a
grep -v ';-' nss.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nss.def
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnss3.so
gcc -shared  -Wl,-z,defs -Wl,-soname -Wl,libnss3.so  -Wl,--version-script,Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nss.def -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnss3.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssinit.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utilwrap.o ../certhigh/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certhtml.o ../certhigh/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certreq.o ../certhigh/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlv2.o ../certhigh/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocsp.o ../certhigh/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspsig.o ../certhigh/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certhigh.o ../certhigh/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certvfy.o ../certhigh/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certvfypkix.o ../certhigh/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certvfypkixprint.o ../certhigh/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xcrldist.o ../cryptohi/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sechash.o ../cryptohi/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/seckey.o ../cryptohi/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secsign.o ../cryptohi/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secvfy.o ../cryptohi/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dsautil.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dev3hack.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11akey.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11auth.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11cert.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11cxt.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11err.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11kea.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11list.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11load.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11mech.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11merge.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11nobj.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11obj.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pars.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pbe.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pk12.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11pqg.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11sdr.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11skey.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11slot.o ../pk11wrap/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11util.o ../certdb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/alg1485.o ../certdb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certdb.o ../certdb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certv3.o ../certdb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certxutl.o ../certdb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crl.o ../certdb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/genname.o ../certdb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/stanpcertdb.o ../certdb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/polcyxtn.o ../certdb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secname.o ../certdb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xauthkid.o ../certdb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xbsconst.o ../certdb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/xconst.o ../pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/asymmkey.o ../pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certificate.o ../pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cryptocontext.o ../pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/symmkey.o ../pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/trustdomain.o ../pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tdcache.o ../pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certdecode.o ../pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkistore.o ../pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkibase.o ../pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pki3hack.o ../dev/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/devslot.o ../dev/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/devtoken.o ../dev/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/devutil.o ../dev/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ckhelper.o ../base/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/arena.o ../base/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/error.o ../base/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/errorval.o ../base/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hashops.o ../base/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libc.o ../base/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tracker.o ../base/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/item.o ../base/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/utf8.o ../base/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/list.o ../base/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hash.o ../libpkix/pkix/certsel/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_certselector.o ../libpkix/pkix/certsel/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_comcertselparams.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_basicconstraintschecker.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_certchainchecker.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_crlchecker.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_ekuchecker.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_expirationchecker.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_namechainingchecker.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_nameconstraintschecker.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_ocspchecker.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_revocationmethod.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_revocationchecker.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_policychecker.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_signaturechecker.o ../libpkix/pkix/checker/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_targetcertchecker.o ../libpkix/pkix/params/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_trustanchor.o ../libpkix/pkix/params/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_procparams.o ../libpkix/pkix/params/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_valparams.o ../libpkix/pkix/params/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_resourcelimits.o ../libpkix/pkix/results/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_buildresult.o ../libpkix/pkix/results/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_policynode.o ../libpkix/pkix/results/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_valresult.o ../libpkix/pkix/results/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_verifynode.o ../libpkix/pkix/top/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_validate.o ../libpkix/pkix/top/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_lifecycle.o ../libpkix/pkix/top/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_build.o ../libpkix/pkix/util/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_tools.o ../libpkix/pkix/util/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_error.o ../libpkix/pkix/util/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_logger.o ../libpkix/pkix/util/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_list.o ../libpkix/pkix/util/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_errpaths.o ../libpkix/pkix/crlsel/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_crlselector.o ../libpkix/pkix/crlsel/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_comcrlselparams.o ../libpkix/pkix/store/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_store.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_basicconstraints.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_cert.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_certpolicyinfo.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_certpolicymap.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_certpolicyqualifier.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_crl.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_crldp.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_crlentry.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_date.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_generalname.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_infoaccess.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_nameconstraints.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ocsprequest.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ocspresponse.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_publickey.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_x500name.o ../libpkix/pkix_pl_nss/pki/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ocspcertid.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_bigint.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_bytearray.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_common.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_error.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_hashtable.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_lifecycle.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_mem.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_monitorlock.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_mutex.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_object.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_oid.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_primhash.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_rwlock.o ../libpkix/pkix_pl_nss/system/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_string.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_aiamgr.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_colcertstore.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_httpcertstore.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_httpdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldaptemplates.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldapcertstore.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldapresponse.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldaprequest.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_ldapdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_nsscontext.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_pk11certstore.o ../libpkix/pkix_pl_nss/module/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix_pl_socket.o   -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnss3.so
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnss3.so ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/nss'
cd ssl; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ssl'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derive.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  derive.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dtlscon.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  dtlscon.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/prelib.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  prelib.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3con.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ssl3con.c
ssl3con.c: In function ssl3_InitPendingContextsBypass:
ssl3con.c:1414:28: warning: variable compression_method set but not used [-Wunused-but-set-variable]
ssl3con.c:1412:16: warning: variable macLength set but not used [-Wunused-but-set-variable]
ssl3con.c: In function ssl3_IllegalParameter:
ssl3con.c:2742:12: warning: variable isTLS set but not used [-Wunused-but-set-variable]
ssl3con.c: In function ssl3_HandleCertificate:
ssl3con.c:8345:12: warning: variable trusted set but not used [-Wunused-but-set-variable]
ssl3con.c: In function ssl3_RecordKeyLog:
ssl3con.c:8791:19: warning: variable sid set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3gthr.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ssl3gthr.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslauth.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslauth.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslcon.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslcon.c
sslcon.c: In function ssl2_HandleMessage:
sslcon.c:2498:9: warning: variable rv2 set but not used [-Wunused-but-set-variable]
sslcon.c: In function NSSSSL_VersionCheck:
sslcon.c:3687:19: warning: variable c set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssldef.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ssldef.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslenum.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslenum.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslerr.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslerr.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslerrstrs.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslerrstrs.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslinit.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslinit.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3ext.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ssl3ext.c
ssl3ext.c: In function ssl3_GetSessionTicketKeys:
ssl3ext.c:195:38: warning: comparison between PRStatus and enum _SECStatus [-Wenum-compare]
ssl3ext.c: In function ssl3_HandleServerNameXtn:
ssl3ext.c:390:17: warning: variable type set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslgathr.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslgathr.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslmutex.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslmutex.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslnonce.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslnonce.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslreveal.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslreveal.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslsecur.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslsecur.c
sslsecur.c: In function ssl_SecureRecv:
sslsecur.c:1103:22: warning: variable sec set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslsnce.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslsnce.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslsock.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslsock.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssltrace.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ssltrace.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslver.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslver.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/authcert.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  authcert.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmpcert.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmpcert.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslinfo.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  sslinfo.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3ecc.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ssl3ecc.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/unix_err.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_ENABLE_ZLIB -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  unix_err.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libssl.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libssl.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derive.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dtlscon.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/prelib.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3con.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3gthr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslauth.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslcon.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssldef.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslenum.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslerr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslerrstrs.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslinit.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3ext.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslgathr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslmutex.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslnonce.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslreveal.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslsecur.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslsnce.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslsock.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssltrace.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/authcert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmpcert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslinfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3ecc.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/unix_err.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libssl.a
grep -v ';-' ssl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl.def
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libssl3.so
gcc -shared  -Wl,-z,defs -Wl,-soname -Wl,libssl3.so  -Wl,--version-script,Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl.def -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libssl3.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derive.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dtlscon.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/prelib.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3con.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3gthr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslauth.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslcon.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssldef.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslenum.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslerr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslerrstrs.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslinit.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3ext.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslgathr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslmutex.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslnonce.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslreveal.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslsecur.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslsnce.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslsock.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssltrace.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/authcert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmpcert.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sslinfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssl3ecc.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/unix_err.o   ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc -lz
chmod +x Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libssl3.so
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libssl3.so ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ssl'
cd pkcs12; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pkcs12'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12local.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12local.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12creat.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12creat.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12dec.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12dec.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12plcy.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12plcy.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12tmpl.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12tmpl.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12e.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12e.c
p12e.c: In function sec_PKCS12CreateSafeBag:
p12e.c:698:12: warning: variable setName set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12d.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p12d.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkcs12.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkcs12.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12local.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12creat.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12dec.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12plcy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12tmpl.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12e.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12d.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkcs12.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkcs12.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pkcs12'
cd pkcs7; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pkcs7'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certread.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  certread.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7common.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p7common.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7create.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p7create.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7decode.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p7decode.c
p7decode.c: In function sec_pkcs7_decoder_get_recipient_key:
p7decode.c:410:9: warning: unused variable bulkLength [-Wunused-variable]
p7decode.c: In function sec_pkcs7_verify_signature:
p7decode.c:1291:21: warning: variable crls set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7encode.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p7encode.c
p7encode.c: In function sec_pkcs7_encoder_start_encrypt:
p7encode.c:64:18: warning: variable wincx set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7local.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  p7local.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secmime.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secmime.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkcs7.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkcs7.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certread.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7common.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7create.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7decode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7encode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7local.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secmime.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkcs7.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libpkcs7.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/pkcs7'
cd smime; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/smime'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsarray.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsarray.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsasn1.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsasn1.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsattr.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsattr.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmscinfo.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmscinfo.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmscipher.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmscipher.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsdecode.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsdecode.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsdigdata.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsdigdata.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsdigest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsdigest.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsencdata.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsencdata.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsencode.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsencode.c
cmsencode.c: In function nss_cms_encoder_notify:
cmsencode.c:127:18: warning: variable poolp set but not used [-Wunused-but-set-variable]
cmsencode.c: In function nss_cms_before_data:
cmsencode.c:206:18: warning: variable poolp set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsenvdata.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsenvdata.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsmessage.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsmessage.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmspubkey.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmspubkey.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsrecinfo.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsrecinfo.c
cmsrecinfo.c: In function NSS_CMSRecipientInfo_UnwrapBulkKey:
cmsrecinfo.c:531:21: warning: variable encalg set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsreclist.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsreclist.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmssigdata.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmssigdata.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmssiginfo.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmssiginfo.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsudf.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsudf.c
cmsudf.c: In function nss_cmstype_hash_key:
cmsudf.c:84:11: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
cmsudf.c: In function nss_cmstype_compare_keys:
cmsudf.c:90:26: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
cmsudf.c:91:26: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmsutil.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smimemessage.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  smimemessage.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smimeutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  smimeutil.c
smimeutil.c: In function NSSSMIME_VersionCheck:
smimeutil.c:772:19: warning: variable c set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smimever.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  smimever.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsmime.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsmime.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsarray.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsasn1.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsattr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmscinfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmscipher.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsdecode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsdigdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsdigest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsencdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsencode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsenvdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsmessage.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmspubkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsrecinfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsreclist.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmssigdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmssiginfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsudf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smimemessage.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smimeutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smimever.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsmime.a
grep -v ';-' smime.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smime.def
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsmime3.so
gcc -shared  -Wl,-z,defs -Wl,-soname -Wl,libsmime3.so  -Wl,--version-script,Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smime.def -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsmime3.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsarray.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsasn1.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsattr.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmscinfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmscipher.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsdecode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsdigdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsdigest.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsencdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsencode.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsenvdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsmessage.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmspubkey.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsrecinfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsreclist.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmssigdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmssiginfo.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsudf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smimemessage.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smimeutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/smimever.o ../pkcs12/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12local.o ../pkcs12/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12creat.o ../pkcs12/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12dec.o ../pkcs12/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12plcy.o ../pkcs12/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12tmpl.o ../pkcs12/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12e.o ../pkcs12/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p12d.o ../pkcs7/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certread.o ../pkcs7/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7common.o ../pkcs7/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7create.o ../pkcs7/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7decode.o ../pkcs7/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7encode.o ../pkcs7/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7local.o ../pkcs7/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secmime.o   -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsmime3.so
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsmime.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsmime3.so ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/smime'
cd crmf; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/crmf'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfenc.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmfenc.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmftmpl.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmftmpl.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfreq.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmfreq.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfpop.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmfpop.c
crmfpop.c: In function CRMF_CertReqMsgSetRAVerifiedPOP:
crmfpop.c:36:14: warning: variable dummy set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfdec.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmfdec.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfget.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmfget.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfcont.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  crmfcont.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmmfasn1.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmmfasn1.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmmfresp.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmmfresp.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmmfrec.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmmfrec.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmmfchal.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  cmmfchal.c
cmmfchal.c: In function cmmf_create_witness_and_challenge:
cmmfchal.c:33:22: warning: variable id set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/servget.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  servget.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/encutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  encutil.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/respcli.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  respcli.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/respcmn.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  respcmn.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/challcli.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  challcli.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/asn1cmn.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  asn1cmn.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcrmf.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcrmf.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfenc.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmftmpl.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfreq.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfpop.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfdec.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfget.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmfcont.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmmfasn1.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmmfresp.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmmfrec.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmmfchal.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/servget.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/encutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/respcli.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/respcmn.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/challcli.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/asn1cmn.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcrmf.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libcrmf.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/crmf'
cd jar; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/jar'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jarver.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X64 -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jarver.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jarsign.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X64 -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jarsign.c
jarsign.c: In function jar_create_pk7:
jarsign.c:174:11: warning: variable errstring set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jar.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X64 -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jar.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jar-ds.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X64 -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jar-ds.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jarfile.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X64 -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jarfile.c
jarfile.c: In function jar_listtar:
jarfile.c:824:12: warning: variable when set but not used [-Wunused-but-set-variable]
jarfile.c:823:14: warning: variable mode set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jarint.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DMOZILLA_CLIENT=1 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_X86_OR_X64 -DNSS_X64 -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  jarint.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libjar.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libjar.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jarver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jarsign.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jar.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jar-ds.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jarfile.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/jarint.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libjar.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libjar.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/jar'
cd ckfw; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crypto.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  crypto.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/find.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  find.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hash.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  hash.c
hash.c: In function nss_ckfw_identity_hash:
hash.c:55:16: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/instance.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  instance.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mutex.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  mutex.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/object.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  object.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/session.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  session.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sessobj.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  sessobj.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/slot.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  slot.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/token.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  token.c
token.c: In function nssCKFWToken_GetUTCTime:
token.c:1265:27: warning: variable z set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/wrap.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  wrap.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mechanism.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr  mechanism.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssckfw.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssckfw.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crypto.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/find.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/hash.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/instance.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mutex.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/object.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/session.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sessobj.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/slot.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/token.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/wrap.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mechanism.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssckfw.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssckfw.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
cd builtins; gmake libs
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw/builtins'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/anchor.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  anchor.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/constants.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  constants.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bfind.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  bfind.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/binst.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  binst.c
binst.c: In function builtins_mdInstance_GetLibraryVersion:
binst.c:74:17: warning: variable c set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bobject.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  bobject.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bsession.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  bsession.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bslot.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  bslot.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/btoken.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  btoken.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certdata.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  certdata.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ckbiver.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr  ckbiver.c
grep -v ';-' nssckbi.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssckbi.def
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssckbi.so
gcc -shared  -Wl,-z,defs -Wl,-soname -Wl,libnssckbi.so  -Wl,--version-script,Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nssckbi.def -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssckbi.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/anchor.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/constants.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bfind.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/binst.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bobject.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bsession.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bslot.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/btoken.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certdata.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ckbiver.o   ../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckfw.a ../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssb.a  -L../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssckbi.so
../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssckbi.so ../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw/builtins'
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/ckfw'
cd sysinit; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/sysinit'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsssysinit.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss   nsssysinit.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsssysinit.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsssysinit.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsssysinit.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsssysinit.a
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsssysinit.so
gcc -shared  -Wl,-z,defs -Wl,-soname -Wl,libnsssysinit.so  -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsssysinit.so Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsssysinit.o    -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
chmod +x Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsssysinit.so
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsssysinit.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnsssysinit.so ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib/sysinit'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/lib'
cd cmd; gmake libs
gmake[1]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd'
cd lib; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/lib'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/basicutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  basicutil.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secutil.c
secutil.c: In function SECU_ChangePW2:
secutil.c:319:15: warning: variable rv set but not used [-Wunused-but-set-variable]
secutil.c: In function SECU_displayVerifyLog:
secutil.c:3167:11: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
secutil.c:3183:11: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secpwd.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  secpwd.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derprint.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  derprint.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/moreoids.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  moreoids.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pppolicy.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pppolicy.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ffs.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  ffs.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11table.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  pk11table.c
rm -f Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsectool.a
ar cr Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsectool.a Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/basicutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secpwd.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derprint.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/moreoids.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pppolicy.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ffs.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11table.o
ranlib Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsectool.a
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 664 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsectool.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/lib'
cd addbuiltin; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/addbuiltin'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/addbuiltin.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd  addbuiltin.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/addbuiltin -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/addbuiltin.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/addbuiltin ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/addbuiltin'
cd atob; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/atob'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/atob.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  atob.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/atob -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/atob.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/atob ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/atob'
cd bltest; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/bltest'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/blapitest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken  blapitest.c
blapitest.c: In function serialize_key:
blapitest.c:319:15: warning: variable status set but not used [-Wunused-but-set-variable]
blapitest.c: In function dsaOp:
blapitest.c:2143:83: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c:2175:83: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c:2211:79: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c: In function ecdsaOp:
blapitest.c:2265:83: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c:2298:83: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c:2333:79: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c: In function cipherDoOp:
blapitest.c:2403:79: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c:2437:79: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c:2471:79: warning: variable L100 set but not used [-Wunused-but-set-variable]
blapitest.c: In function printPR_smpString:
blapitest.c:2602:13: warning: variable prnRes set but not used [-Wunused-but-set-variable]
blapitest.c: In function main:
blapitest.c:3473:11: warning: variable infileName set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bltest -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/blapitest.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsmime.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs12.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs7.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcryptohi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcertdb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdev.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libdbm.a  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixutil.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixsystem.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixmodule.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixstore.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixparams.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixchecker.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixpki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixresults.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lsqlite3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bltest ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/bltest'
cd btoa; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/btoa'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/btoa.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  btoa.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/btoa -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/btoa.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/btoa ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/btoa'
cd certcgi; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/certcgi'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certcgi.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  certcgi.c
certcgi.c: In function MakeV1Cert:
certcgi.c:530:15: warning: variable rv set but not used [-Wunused-but-set-variable]
certcgi.c: In function string_to_binary:
certcgi.c:1420:9: warning: variable low_digit set but not used [-Wunused-but-set-variable]
certcgi.c:1419:9: warning: variable high_digit set but not used [-Wunused-but-set-variable]
certcgi.c: At top level:
certcgi.c:360:1: warning: update_data_by_name defined but not used [-Wunused-function]
certcgi.c:388:1: warning: update_data_by_index defined but not used [-Wunused-function]
certcgi.c:404:1: warning: add_field defined but not used [-Wunused-function]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certcgi -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certcgi.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsmime.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs12.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs7.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcryptohi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcertdb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdev.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libdbm.a  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixutil.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixsystem.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixmodule.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixstore.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixparams.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixchecker.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixpki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixresults.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lsqlite3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certcgi ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/certcgi'
cd certutil; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/certutil'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certext.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  certext.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  certutil.c
certutil.c: In function CreateCert:
certutil.c:1805:13: warning: variable reqDER set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/keystuff.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  keystuff.c
keystuff.c: In function CERTUTIL_GeneratePrivateKey:
keystuff.c:496:15: warning: variable algtag set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certutil -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certext.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/keystuff.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certutil ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/certutil'
cd checkcert; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/checkcert'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/checkcert.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  checkcert.c
checkcert.c: In function OurVerifyData:
checkcert.c:125:15: warning: variable sigAlgTag set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/checkcert -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/checkcert.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/checkcert ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/checkcert'
cd chktest; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/chktest'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/chktest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  chktest.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/chktest -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/chktest.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsmime.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs12.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs7.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcryptohi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcertdb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdev.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libdbm.a  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixutil.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixsystem.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixmodule.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixstore.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixparams.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixchecker.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixpki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixresults.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lsqlite3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/chktest ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/chktest'
cd crlutil; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/crlutil'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlgen_lex.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  crlgen_lex.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlgen.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  crlgen.c
crlgen.c: In function crlgen_RmCert:
crlgen.c:1082:18: warning: variable arena set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  crlutil.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlutil -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlgen_lex.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlgen.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlutil.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crlutil ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/crlutil'
cd crmftest; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/crmftest'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/testcrmf.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  testcrmf.c
testcrmf.c: In function get_serial_number:
testcrmf.c:130:14: warning: variable rv set but not used [-Wunused-but-set-variable]
testcrmf.c: In function main:
testcrmf.c:1539:12: warning: variable PArg set but not used [-Wunused-but-set-variable]
testcrmf.c:1538:12: warning: variable sArg set but not used [-Wunused-but-set-variable]
testcrmf.c:1537:12: warning: variable eArg set but not used [-Wunused-but-set-variable]
testcrmf.c:1536:12: warning: variable pArg set but not used [-Wunused-but-set-variable]
testcrmf.c: At top level:
testcrmf.c:941:1: warning: mapWrapKeyType defined but not used [-Wunused-function]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmftest -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/testcrmf.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcrmf.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/crmftest ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/crmftest'
cd dbtest; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/dbtest'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dbtest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  dbtest.c
In file included from ../modutil/modutil.h:21:0,
                 from dbtest.c:32:
../modutil/error.h:136:14: warning: msgStrings defined but not used [-Wunused-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dbtest -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dbtest.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dbtest ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/dbtest'
cd derdump; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/derdump'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derdump.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  derdump.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derdump -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derdump.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/derdump ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/derdump'
cd digest; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/digest'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/digest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  digest.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/digest -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/digest.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/digest ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/digest'
cd httpserv; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/httpserv'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/httpserv.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  httpserv.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/httpserv -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/httpserv.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/httpserv ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/httpserv'
cd fipstest; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/fipstest'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  fipstest.c
fipstest.c: In function drbg:
fipstest.c:2602:12: warning: variable predictionResistance set but not used [-Wunused-but-set-variable]
fipstest.c: At top level:
fipstest.c:2540:1: warning: alloc_value defined but not used [-Wunused-function]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstest -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstest.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsmime.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs12.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs7.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcryptohi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcertdb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdev.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libdbm.a  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixutil.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixsystem.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixmodule.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixstore.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixparams.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixchecker.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixpki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixresults.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lsqlite3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/fipstest ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/fipstest'
cd lowhashtest; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/lowhashtest'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowhashtest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../nss/lib/freebl -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken  lowhashtest.c
lowhashtest.c: In function main:
lowhashtest.c:402:17: warning: unused variable status [-Wunused-variable]
lowhashtest.c:401:17: warning: unused variable optstate [-Wunused-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowhashtest -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../nss/lib/freebl -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm -I../../../../dist/public/softoken  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowhashtest.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -lfreebl3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lowhashtest ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/lowhashtest'
cd listsuites; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/listsuites'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/listsuites.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  listsuites.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/listsuites -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/listsuites.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/listsuites ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/listsuites'
cd makepqg; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/makepqg'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/makepqg.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm  makepqg.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/makepqg -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/makepqg.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/makepqg ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/makepqg'
cd multinit; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/multinit'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/multinit.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss   multinit.c
multinit.c:320:1: warning: appendItem defined but not used [-Wunused-function]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/multinit -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss   Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/multinit.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/multinit ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/multinit'
cd ocspclnt; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ocspclnt'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspclnt.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  ocspclnt.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspclnt -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspclnt.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsmime.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs12.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs7.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcryptohi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcertdb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdev.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libdbm.a  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixutil.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixsystem.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixmodule.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixstore.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixparams.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixchecker.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixpki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixresults.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lsqlite3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspclnt ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ocspclnt'
cd ocspresp; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ocspresp'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspresp.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  ocspresp.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspresp -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspresp.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ocspresp ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ocspresp'
cd oidcalc; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/oidcalc'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/oidcalc.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  oidcalc.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/oidcalc -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/oidcalc.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/oidcalc ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/oidcalc'
cd p7content; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7content'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7content.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  p7content.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7content -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7content.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7content ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7content'
cd p7env; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7env'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7env.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  p7env.c
p7env.c: In function main:
p7env.c:135:11: warning: variable certName set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7env -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7env.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7env ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7env'
cd p7sign; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7sign'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7sign.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  p7sign.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7sign -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7sign.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7sign ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7sign'
cd p7verify; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7verify'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7verify.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  p7verify.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7verify -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7verify.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/p7verify ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/p7verify'
cd pk12util; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk12util'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk12util.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  pk12util.c
pk12util.c: In function p12u_InitContext:
pk12util.c:104:12: warning: variable fileExist set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk12util -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk12util.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk12util ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk12util'
cd pk11mode; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk11mode'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11mode.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  pk11mode.c
pk11mode.c: In function PKM_TLSMasterKeyDerive:
pk11mode.c:4561:16: warning: variable expected_version set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11mode -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11mode.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11mode ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk11mode'
cd pk1sign; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk1sign'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk1sign.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  pk1sign.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk1sign -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk1sign.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk1sign ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pk1sign'
cd pkix-errcodes; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pkix-errcodes'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix-errcodes.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  pkix-errcodes.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix-errcodes -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix-errcodes.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pkix-errcodes ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pkix-errcodes'
cd pp; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pp'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pp.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  pp.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pp -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pp.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pp ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pp'
cd pwdecrypt; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pwdecrypt'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pwdecrypt.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  pwdecrypt.c
pwdecrypt.c: In function doDecrypt:
pwdecrypt.c:140:18: warning: unused variable i [-Wunused-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pwdecrypt -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pwdecrypt.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pwdecrypt ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/pwdecrypt'
cd rsaperf; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/rsaperf'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/rsaperf.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  rsaperf.c
rsaperf.c: In function main:
rsaperf.c:433:27: warning: variable certdb set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/defkey.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  defkey.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/rsaperf -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -DNSS_USE_STATIC_LIBS -I../../../nss/lib/softoken -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/rsaperf.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/defkey.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsmime.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs12.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs7.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcryptohi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcertdb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdev.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssb.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libdbm.a  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixutil.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixsystem.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcrlsel.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixmodule.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixstore.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixparams.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixchecker.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixpki.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixresults.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcertsel.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lsqlite3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/rsaperf ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/rsaperf'
cd sdrtest; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/sdrtest'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sdrtest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  sdrtest.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sdrtest -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sdrtest.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sdrtest ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/sdrtest'
cd selfserv; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/selfserv'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/selfserv.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  selfserv.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/selfserv -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/selfserv.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/selfserv ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/selfserv'
cd signtool; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/signtool'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/signtool.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  signtool.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certgen.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  certgen.c
certgen.c: In function sign_cert:
certgen.c:423:11: warning: variable dummy set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/javascript.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  javascript.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/list.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  list.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sign.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  sign.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/util.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  util.c
util.c: In function XP_GetString:
util.c:21:5: warning: return discards const qualifier from pointer target type [enabled by default]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/verify.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  verify.c
verify.c: In function VerifyJar:
verify.c:55:11: warning: assignment discards const qualifier from pointer target type [enabled by default]
verify.c: In function JarWho:
verify.c:286:11: warning: assignment discards const qualifier from pointer target type [enabled by default]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/zip.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  zip.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/signtool -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/signtool.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/certgen.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/javascript.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/list.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/sign.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/util.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/verify.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/zip.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libjar.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc -lz
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/signtool ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/signtool'
cd signver; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/signver'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/signver.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  signver.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk7print.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  pk7print.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/signver -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/signver.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk7print.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/signver ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/signver'
cd shlibsign; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/shlibsign.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  shlibsign.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/shlibsign -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/shlibsign.o   -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/shlibsign ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
cd mangle; gmake libs
gmake[3]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/mangle'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mangle.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss  mangle.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mangle -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mangle.o   -L../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/mangle ../../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[3]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/mangle'
cd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ ; sh "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ" \
"/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ" Linux \
"/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib" "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn3.so"
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/shlibsign -v -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn3.so
Library File: ../../../security/nss/lib/softoken/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsoftokn3.so 731308 bytes
Check File: ../../../security/nss/lib/softoken/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libsoftokn3.chk
Link: libsoftokn3.chk
  hash: 32 bytes
    f1 63 c8 c3 36 ce bd 38 c5 c6
    77 76 83 ca b2 7c e4 dd 60 e8
    df 81 7e b8 37 9c d6 c5 e8 cd
    bb f8
  signature: 64 bytes
    17 c1 b8 6b 3a a3 23 07 b1 ee
    e0 88 56 bc 05 34 ba e9 fd 77
    d0 2d 60 70 d5 54 33 e1 7e 45
    41 94 62 36 f6 84 1f 03 fa c0
    23 ef ca dc b0 20 10 47 6e 1b
    db 18 45 0c cf d7 11 a0 a7 9c
    42 8d 07 ef
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
cd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ ; sh "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ" \
"/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ" Linux \
"/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib" "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl3.so"
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/shlibsign -v -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl3.so
Library File: ../../../security/nss/lib/freebl/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so 1108591 bytes
Check File: ../../../security/nss/lib/freebl/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/Linux_SINGLE_SHLIB/libfreebl3.chk
Link: libfreebl3.chk
  hash: 32 bytes
    9a 72 69 c9 80 62 e8 89 8e 70
    75 cc 38 03 09 86 fc 9c 28 d9
    51 53 27 e5 69 9d 1f 73 47 b0
    bd 14
  signature: 64 bytes
    53 ea 05 2b 9d b5 ad 69 37 bc
    b8 bc 0b 23 45 9c d7 ec 69 57
    8a 51 30 a8 a0 60 b6 40 33 9a
    65 6c 43 7d 23 14 ac 10 31 86
    d9 1b 01 60 fb e6 57 bf 04 2a
    4d 35 06 1b 0b 82 25 b3 ff 6c
    05 01 50 62
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
cd Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ ; sh "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/."/sign.sh "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ" \
"/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ" Linux \
"/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib" "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdbm3.so"
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/shlibsign -v -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign/../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdbm3.so
Library File: ../../../security/nss/lib/softoken/legacydb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdbm3.so 482493 bytes
Check File: ../../../security/nss/lib/softoken/legacydb/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/libnssdbm3.chk
Link: libnssdbm3.chk
  hash: 32 bytes
    f9 91 54 a6 44 d1 ad de cd 11
    ce a1 ca b4 ba b8 45 8b 52 22
    47 fd 1f 40 b4 ca 4f 29 5d 01
    98 fd
  signature: 64 bytes
    56 00 68 91 d6 c3 9f d4 a2 b2
    4f 53 98 0f ab a3 01 3d af f8
    c8 ad f4 29 e8 21 e6 27 01 de
    17 1b 45 a1 19 c5 5d 54 9d ab
    bd 4e 95 b5 f9 27 20 16 4a 8c
    d8 83 0c 66 e7 b1 79 84 fb c9
    b5 a9 e4 f2
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ... 
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/shlibsign'
cd smimetools; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/smimetools'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  cmsutil.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsutil -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsutil.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/cmsutil ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/smimetools'
cd ssltap; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ssltap'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssltap.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  ssltap.c
ssltap.c: In function print_ssl:
ssltap.c:1137:9: warning: variable l set but not used [-Wunused-but-set-variable]
ssltap.c:1137:7: warning: variable i set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssltap -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssltap.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/ssltap ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/ssltap'
cd strsclnt; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/strsclnt'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/strsclnt.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  strsclnt.c
strsclnt.c: In function myHandshakeCallback:
strsclnt.c:706:56: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
strsclnt.c: In function do_connects:
strsclnt.c:831:62: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
strsclnt.c:726:15: warning: variable result set but not used [-Wunused-but-set-variable]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/strsclnt -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/strsclnt.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/strsclnt ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/strsclnt'
cd symkeyutil; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/symkeyutil'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/symkeyutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  symkeyutil.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/symkeyutil -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss  -I../../../../dist/private/nss  -I../../../../dist/public/dbm -I../../../../dist/public/seccmd  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/symkeyutil.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/symkeyutil ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/symkeyutil'
cd tests; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/tests'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/baddbdir.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  baddbdir.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/baddbdir -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/baddbdir.o \
 ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/conflict.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  conflict.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/conflict -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/conflict.o \
 ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dertimetest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  dertimetest.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dertimetest -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dertimetest.o \
 ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/encodeinttest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  encodeinttest.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/encodeinttest -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/encodeinttest.o \
 ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nonspr10.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  nonspr10.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nonspr10 -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nonspr10.o \
 ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/remtest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  remtest.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/remtest -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/remtest.o \
 ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secmodtest.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  secmodtest.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secmodtest -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secmodtest.o \
 ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/baddbdir Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/conflict Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/dertimetest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/encodeinttest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nonspr10 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/remtest Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/secmodtest ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/tests'
cd tstclnt; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/tstclnt'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tstclnt.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  tstclnt.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tstclnt -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tstclnt.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/tstclnt ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/tstclnt'
cd vfychain; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/vfychain'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfychain.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  vfychain.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfychain -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfychain.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfychain ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/vfychain'
cd vfyserv; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/vfyserv'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfyserv.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  vfyserv.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfyutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  vfyutil.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfyserv -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/seccmd -I../../../../dist/public/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfyserv.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfyutil.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/vfyserv ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/vfyserv'
cd modutil; gmake libs
gmake[2]: Entering directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/modutil'
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/modutil.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  modutil.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  pk11.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/instsec.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  instsec.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/install.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  install.c
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/installparse.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  installparse.c
ytab.c: In function Pk11Install_yyparse:
ytab.c:219:5: warning: suggest parentheses around assignment used as truth value [-Wparentheses]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/install-ds.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  install-ds.c
install-ds.c: In function Pk11Install_File_Generate:
install-ds.c:223:40: warning: comparison with string literal results in unspecified behavior [-Waddress]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lex.Pk11Install_yy.o -c -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  lex.Pk11Install_yy.c
lex.Pk11Install_yy.cpp:1060:13: warning: Pkcs11Install_yyunput defined but not used [-Wunused-function]
lex.Pk11Install_yy.cpp:1106:12: warning: input defined but not used [-Wunused-function]
gcc -o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/modutil -g -ansi -D_POSIX_SOURCE -D_BSD_SOURCE -D_XOPEN_SOURCE -fPIC -DLINUX2_1  -Wall -Werror-implicit-function-declaration -Wno-switch -pipe -DLINUX -Dlinux -DHAVE_STRERROR -DXP_UNIX -DNSPR20 -DDEBUG -UNDEBUG -DDEBUG_tinderbox -D_REENTRANT -DNSS_ENABLE_ECC -DNSS_ECC_MORE_THAN_SUITE_B -DUSE_UTIL_DIRECTLY -I../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/include -I../../../../dist/public/sectools -I../../../../dist/private/sectools -I../../../../dist/public/seccmd -I../../../../dist/public/nss -I../../../../dist/public/dbm -I../../../../dist/private/seccmd -I../../../../dist/private/nss -I../../../../dist/private/dbm  Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/modutil.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/pk11.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/instsec.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/install.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/installparse.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/install-ds.o Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lex.Pk11Install_yy.o  ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libjar.a ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a  -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lssl3 -lsmime3 -lnss3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lnssutil3 -L../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib -lplc4 -lplds4 -lnspr4  -lpthread  -ldl -lc -lz
../../../coreconf/nsinstall/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/nsinstall -R -m 775 Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/modutil ../../../../dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin
gmake[2]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd/modutil'
gmake[1]: Leaving directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/cmd'
TB [2012-11-27 18:54:32] NSS - build - 64 bits - DBG PASSED
TB [2012-11-27 18:54:32] ######## NSS - tests - 64 bits - DBG ########
TinderboxPrint:
TB [2012-11-27 18:54:32] $ cd /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests
TB [2012-11-27 18:54:32] $ ./all.sh
testdir is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security
init.sh init: Creating /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security
********************************************
   Platform: Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ
   Results: buildnss02.1
********************************************

init.sh init: Testing PATH .:/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin:/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib:/bin:/usr/bin:/usr/lib64/ccache:/usr/local/bin:/usr/local/sbin:/usr/sbin:/home/tinderbox/.local/bin:/home/tinderbox/bin against LIB /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib:
Running tests for cipher
TIMESTAMP cipher BEGIN: Tue Nov 27 18:54:32 EST 2012
cipher.sh: Cipher Tests ===============================
cipher.sh: DES ECB Encrypt --------------------------------
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des_ecb passed.
cipher.sh: #1: DES ECB Encrypt  - PASSED
cipher.sh: DES ECB Decrypt --------------------------------
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des_ecb passed.
cipher.sh: #2: DES ECB Decrypt  - PASSED
cipher.sh: DES CBC Encrypt --------------------------------
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des_cbc passed.
cipher.sh: #3: DES CBC Encrypt  - PASSED
cipher.sh: DES CBC Decrypt --------------------------------
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des_cbc passed.
cipher.sh: #4: DES CBC Decrypt  - PASSED
cipher.sh: DES3 ECB Encrypt --------------------------------
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des3_ecb passed.
cipher.sh: #5: DES3 ECB Encrypt  - PASSED
cipher.sh: DES3 ECB Decrypt --------------------------------
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des3_ecb passed.
cipher.sh: #6: DES3 ECB Decrypt  - PASSED
cipher.sh: DES3 CBC Encrypt --------------------------------
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des3_cbc passed.
cipher.sh: #7: DES3 CBC Encrypt  - PASSED
cipher.sh: DES3 CBC Decrypt --------------------------------
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des3_cbc passed.
cipher.sh: #8: DES3 CBC Decrypt  - PASSED
cipher.sh: AES ECB Encrypt --------------------------------
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_ecb passed.
cipher.sh: #9: AES ECB Encrypt  - PASSED
cipher.sh: AES ECB Decrypt --------------------------------
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for aes_ecb passed.
cipher.sh: #10: AES ECB Decrypt  - PASSED
cipher.sh: AES CBC Encrypt --------------------------------
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_cbc passed.
cipher.sh: #11: AES CBC Encrypt  - PASSED
cipher.sh: AES CBC Decrypt --------------------------------
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for aes_cbc passed.
cipher.sh: #12: AES CBC Decrypt  - PASSED
cipher.sh: Camellia ECB Encrypt --------------------------------
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
cipher.sh: #13: Camellia ECB Encrypt  - PASSED
cipher.sh: Camellia ECB Decrypt --------------------------------
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
cipher.sh: #14: Camellia ECB Decrypt  - PASSED
cipher.sh: Camellia CBC Encrypt --------------------------------
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
cipher.sh: #15: Camellia CBC Encrypt  - PASSED
cipher.sh: Camellia CBC Decrypt --------------------------------
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
cipher.sh: #16: Camellia CBC Decrypt  - PASSED
cipher.sh: SEED ECB Encrypt --------------------------------
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for seed_ecb passed.
cipher.sh: #17: SEED ECB Encrypt  - PASSED
cipher.sh: SEED ECB Decrypt --------------------------------
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for seed_ecb passed.
cipher.sh: #18: SEED ECB Decrypt  - PASSED
cipher.sh: SEED CBC Encrypt --------------------------------
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for seed_cbc passed.
cipher.sh: #19: SEED CBC Encrypt  - PASSED
cipher.sh: SEED CBC Decrypt --------------------------------
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for seed_cbc passed.
cipher.sh: #20: SEED CBC Decrypt  - PASSED
cipher.sh: RC2 ECB Encrypt --------------------------------
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rc2_ecb passed.
cipher.sh: #21: RC2 ECB Encrypt  - PASSED
cipher.sh: RC2 ECB Decrypt --------------------------------
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rc2_ecb passed.
cipher.sh: #22: RC2 ECB Decrypt  - PASSED
cipher.sh: RC2 CBC Encrypt --------------------------------
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rc2_cbc passed.
cipher.sh: #23: RC2 CBC Encrypt  - PASSED
cipher.sh: RC2 CBC Decrypt --------------------------------
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rc2_cbc passed.
cipher.sh: #24: RC2 CBC Decrypt  - PASSED
cipher.sh: RC4 Encrypt --------------------------------
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
cipher.sh: #25: RC4 Encrypt  - PASSED
cipher.sh: RC4 Decrypt --------------------------------
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
cipher.sh: #26: RC4 Decrypt  - PASSED
cipher.sh: RSA Encrypt --------------------------------
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rsa passed.
cipher.sh: #27: RSA Encrypt  - PASSED
cipher.sh: RSA Decrypt --------------------------------
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rsa passed.
cipher.sh: #28: RSA Decrypt  - PASSED
cipher.sh: DSA Sign --------------------------------
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
cipher.sh: #29: DSA Sign  - PASSED
cipher.sh: DSA Verify --------------------------------
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
cipher.sh: #30: DSA Verify  - PASSED
cipher.sh: MD2 Hash --------------------------------
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for md2 passed.
cipher.sh: #31: MD2 Hash  - PASSED
cipher.sh: MD5 Hash --------------------------------
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for md5 passed.
cipher.sh: #32: MD5 Hash  - PASSED
cipher.sh: SHA1 Hash --------------------------------
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha1 passed.
cipher.sh: #33: SHA1 Hash  - PASSED
cipher.sh: SHA224 Hash --------------------------------
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
cipher.sh: #34: SHA224 Hash  - PASSED
cipher.sh: SHA256 Hash --------------------------------
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
cipher.sh: #35: SHA256 Hash  - PASSED
cipher.sh: SHA384 Hash --------------------------------
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
cipher.sh: #36: SHA384 Hash  - PASSED
cipher.sh: SHA512 Hash --------------------------------
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
cipher.sh: #37: SHA512 Hash  - PASSED
TIMESTAMP cipher END: Tue Nov 27 18:55:13 EST 2012
Running tests for lowhash
TIMESTAMP lowhash BEGIN: Tue Nov 27 18:55:13 EST 2012
lowhash.sh: Lowhash Tests ===============================
lowhashtest with fips mode=
lowhashtest MD5
lowhash.sh: #38: lowhashtest with fips mode= for MD5  - PASSED
lowhashtest SHA1
lowhash.sh: #39: lowhashtest with fips mode= for SHA1  - PASSED
lowhashtest SHA224
lowhash.sh: #40: lowhashtest with fips mode= for SHA224  - PASSED
lowhashtest SHA256
lowhash.sh: #41: lowhashtest with fips mode= for SHA256  - PASSED
lowhashtest SHA384
lowhash.sh: #42: lowhashtest with fips mode= for SHA384  - PASSED
lowhashtest SHA512
lowhash.sh: #43: lowhashtest with fips mode= for SHA512  - PASSED
lowhashtest with fips mode=
lowhashtest MD5
lowhash.sh: #44: lowhashtest with fips mode= for MD5  - PASSED
lowhashtest SHA1
lowhash.sh: #45: lowhashtest with fips mode= for SHA1  - PASSED
lowhashtest SHA224
lowhash.sh: #46: lowhashtest with fips mode= for SHA224  - PASSED
lowhashtest SHA256
lowhash.sh: #47: lowhashtest with fips mode= for SHA256  - PASSED
lowhashtest SHA384
lowhash.sh: #48: lowhashtest with fips mode= for SHA384  - PASSED
lowhashtest SHA512
lowhash.sh: #49: lowhashtest with fips mode= for SHA512  - PASSED
lowhash.sh done
TIMESTAMP lowhash END: Tue Nov 27 18:55:14 EST 2012
Running tests for libpkix
TIMESTAMP libpkix BEGIN: Tue Nov 27 18:55:14 EST 2012
TIMESTAMP libpkix END: Tue Nov 27 18:55:14 EST 2012
Running tests for cert
TIMESTAMP cert BEGIN: Tue Nov 27 18:55:14 EST 2012
cert.sh: Certutil and Crlutil Tests with ECC ===============================
cert.sh: #50: Looking for root certs module. - PASSED
cert.sh: Creating a CA Certificate TestCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -f ../tests.pw
cert.sh: #51: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #52: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert TestCA  --------------------------
certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #53: Creating CA Cert TestCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n TestCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -o root.cert
cert.sh: #54: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate serverCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA -f ../tests.pw
cert.sh: #55: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #56: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert serverCA  --------------------------
certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #57: Creating CA Cert serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n serverCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA -o root.cert
cert.sh: #58: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-serverCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA
cert.sh: Creating CA Cert chain-1-serverCA  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #59: Creating CA Cert chain-1-serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-serverCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA -o root.cert
cert.sh: #60: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-serverCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA
cert.sh: Creating CA Cert chain-2-serverCA  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #61: Creating CA Cert chain-2-serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-serverCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA -o root.cert
cert.sh: #62: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate clientCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA -f ../tests.pw
cert.sh: #63: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #64: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert clientCA  --------------------------
certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #65: Creating CA Cert clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n clientCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA -o root.cert
cert.sh: #66: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-clientCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA
cert.sh: Creating CA Cert chain-1-clientCA  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #67: Creating CA Cert chain-1-clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-clientCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA -o root.cert
cert.sh: #68: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-clientCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA
cert.sh: Creating CA Cert chain-2-clientCA  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #69: Creating CA Cert chain-2-clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-clientCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA -o root.cert
cert.sh: #70: Exporting Root Cert - PASSED
cert.sh: Creating an EC CA Certificate TestCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA
cert.sh: Creating EC CA Cert TestCA-ec  --------------------------
certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #71: Creating EC CA Cert TestCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n TestCA-ec -r -d . -o ecroot.cert
cert.sh: #72: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate serverCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA
cert.sh: Creating EC CA Cert serverCA-ec  --------------------------
certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #73: Creating EC CA Cert serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n serverCA-ec -r -d . -o ecroot.cert
cert.sh: #74: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA
cert.sh: Creating EC CA Cert chain-1-serverCA-ec  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #75: Creating EC CA Cert chain-1-serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #76: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA
cert.sh: Creating EC CA Cert chain-2-serverCA-ec  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #77: Creating EC CA Cert chain-2-serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #78: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate clientCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA
cert.sh: Creating EC CA Cert clientCA-ec  --------------------------
certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #79: Creating EC CA Cert clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n clientCA-ec -r -d . -o ecroot.cert
cert.sh: #80: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA
cert.sh: Creating EC CA Cert chain-1-clientCA-ec  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #81: Creating EC CA Cert chain-1-clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #82: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA
cert.sh: Creating EC CA Cert chain-2-clientCA-ec  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #83: Creating EC CA Cert chain-2-clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #84: Exporting EC Root Cert - PASSED
cert.sh: Creating Certificates, issued by the last ===============
     of a chain of CA's which are not in the same database============
Server Cert
cert.sh: Initializing buildnss02.usersys.redhat.com's Cert DB (ext.) --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -f ../tests.pw
cert.sh: #85: Initializing buildnss02.usersys.redhat.com's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #86: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for buildnss02.usersys.redhat.com (ext) --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #87: Generate Cert Request for buildnss02.usersys.redhat.com (ext) - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 200 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA -i req -o buildnss02.usersys.redhat.com.cert -f ../tests.pw
cert.sh: #88: Sign buildnss02.usersys.redhat.com's Request (ext) - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's Cert  -t u,u,u (ext) --------------------------
certutil -A -n buildnss02.usersys.redhat.com -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -f ../tests.pw -i buildnss02.usersys.redhat.com.cert
cert.sh: #89: Import buildnss02.usersys.redhat.com's Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n clientCA -t T,, -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA/clientCA.ca.cert
cert.sh: #90: Import Client Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Generate EC Cert Request for buildnss02.usersys.redhat.com (ext) --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #91: Generate EC Cert Request for buildnss02.usersys.redhat.com (ext) - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA -i req -o buildnss02.usersys.redhat.com-ec.cert -f ../tests.pw
cert.sh: #92: Sign buildnss02.usersys.redhat.com's EC Request (ext) - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's EC Cert  -t u,u,u (ext) --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -f ../tests.pw -i buildnss02.usersys.redhat.com-ec.cert
cert.sh: #93: Import buildnss02.usersys.redhat.com's EC Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client EC Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA/clientCA-ec.ca.cert
cert.sh: #94: Import Client EC Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com (ext) --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #95: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com (ext) - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 201 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA -i req -o buildnss02.usersys.redhat.com-ecmixed.cert -f ../tests.pw
cert.sh: #96: Sign buildnss02.usersys.redhat.com's mixed EC Request (ext) - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's mixed EC Cert  -t u,u,u (ext) --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -f ../tests.pw -i buildnss02.usersys.redhat.com-ecmixed.cert
cert.sh: #97: Import buildnss02.usersys.redhat.com's mixed EC Cert  -t u,u,u (ext) - PASSED
Importing all the server's own CA chain into the servers DB
cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA/chain-2-serverCA-ec.ca.cert
cert.sh: #98: Import chain-2-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import chain-1-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA/chain-1-serverCA.ca.cert
cert.sh: #99: Import chain-1-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import serverCA CA -t C,C,C for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA/serverCA.ca.cert
cert.sh: #100: Import serverCA CA -t C,C,C for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import chain-2-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA/chain-2-serverCA.ca.cert
cert.sh: #101: Import chain-2-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import serverCA-ec CA -t C,C,C for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA/serverCA-ec.ca.cert
cert.sh: #102: Import serverCA-ec CA -t C,C,C for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA/chain-1-serverCA-ec.ca.cert
cert.sh: #103: Import chain-1-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  - PASSED
Client Cert
cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -f ../tests.pw
cert.sh: #104: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #105: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #106: Generate Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 300 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw
cert.sh: #107: Sign ExtendedSSLUser's Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -f ../tests.pw -i ExtendedSSLUser.cert
cert.sh: #108: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA/serverCA.ca.cert
cert.sh: #109: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #110: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw
cert.sh: #111: Sign ExtendedSSLUser's EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert
cert.sh: #112: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA/serverCA-ec.ca.cert
cert.sh: #113: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #114: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 301 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw
cert.sh: #115: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert
cert.sh: #116: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED
Importing all the client's own CA chain into the servers DB
cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA/chain-2-clientCA-ec.ca.cert
cert.sh: #117: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA/clientCA.ca.cert
cert.sh: #118: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA/chain-2-clientCA.ca.cert
cert.sh: #119: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA/clientCA-ec.ca.cert
cert.sh: #120: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA/chain-1-clientCA-ec.ca.cert
cert.sh: #121: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/clientCA/chain-1-clientCA.ca.cert
cert.sh: #122: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh SUCCESS: EXT passed
cert.sh: Creating Client CA Issued Certificates ===============
cert.sh: Initializing TestUser's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw
cert.sh: #123: Initializing TestUser's Cert DB - PASSED
cert.sh: Loading root cert module to TestUser's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #124: Loading root cert module to TestUser's Cert DB - PASSED
cert.sh: Import Root CA for TestUser --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -i ../CA/TestCA.ca.cert
cert.sh: #125: Import Root CA for TestUser - PASSED
cert.sh: Import EC Root CA for TestUser --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -i ../CA/TestCA-ec.ca.cert
cert.sh: #126: Import EC Root CA for TestUser - PASSED
cert.sh: Generate Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #127: Generate Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's Request --------------------------
certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw 
cert.sh: #128: Sign TestUser's Request - PASSED
cert.sh: Import TestUser's Cert --------------------------
certutil -A -n TestUser -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser.cert
cert.sh: #129: Import TestUser's Cert - PASSED
cert.sh SUCCESS: TestUser's Cert Created
cert.sh: Generate EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #130: Generate EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request --------------------------
certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw 
cert.sh: #131: Sign TestUser's EC Request - PASSED
cert.sh: Import TestUser's EC Cert --------------------------
certutil -A -n TestUser-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser-ec.cert
cert.sh: #132: Import TestUser's EC Cert - PASSED
cert.sh SUCCESS: TestUser's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #133: Generate mixed EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw 
cert.sh: #134: Sign TestUser's EC Request with RSA - PASSED
cert.sh: Import TestUser's mixed EC Cert --------------------------
certutil -A -n TestUser-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser-ecmixed.cert
cert.sh: #135: Import TestUser's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
             buildnss02.usersys.redhat.com ------------------------------------
cert.sh: Initializing buildnss02.usersys.redhat.com's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw
cert.sh: #136: Initializing buildnss02.usersys.redhat.com's Cert DB - PASSED
cert.sh: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #137: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB - PASSED
cert.sh: Import Root CA for buildnss02.usersys.redhat.com --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -i ../CA/TestCA.ca.cert
cert.sh: #138: Import Root CA for buildnss02.usersys.redhat.com - PASSED
cert.sh: Import EC Root CA for buildnss02.usersys.redhat.com --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -i ../CA/TestCA-ec.ca.cert
cert.sh: #139: Import EC Root CA for buildnss02.usersys.redhat.com - PASSED
cert.sh: Generate Cert Request for buildnss02.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #140: Generate Cert Request for buildnss02.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's Request --------------------------
certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o buildnss02.usersys.redhat.com.cert -f ../tests.pw 
cert.sh: #141: Sign buildnss02.usersys.redhat.com's Request - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's Cert --------------------------
certutil -A -n buildnss02.usersys.redhat.com -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -i buildnss02.usersys.redhat.com.cert
cert.sh: #142: Import buildnss02.usersys.redhat.com's Cert - PASSED
cert.sh SUCCESS: buildnss02.usersys.redhat.com's Cert Created
cert.sh: Generate EC Cert Request for buildnss02.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #143: Generate EC Cert Request for buildnss02.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's EC Request --------------------------
certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o buildnss02.usersys.redhat.com-ec.cert -f ../tests.pw 
cert.sh: #144: Sign buildnss02.usersys.redhat.com's EC Request - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's EC Cert --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -i buildnss02.usersys.redhat.com-ec.cert
cert.sh: #145: Import buildnss02.usersys.redhat.com's EC Cert - PASSED
cert.sh SUCCESS: buildnss02.usersys.redhat.com's EC Cert Created
cert.sh: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #146: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o buildnss02.usersys.redhat.com-ecmixed.cert -f ../tests.pw 
cert.sh: #147: Sign buildnss02.usersys.redhat.com's EC Request with RSA - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's mixed EC Cert --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -i buildnss02.usersys.redhat.com-ecmixed.cert
cert.sh: #148: Import buildnss02.usersys.redhat.com's mixed EC Cert - PASSED
cert.sh SUCCESS: buildnss02.usersys.redhat.com's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
             buildnss02.usersys.redhat.com-sni --------------------------------
cert.sh: Generate Cert Request for buildnss02-sni.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02-sni.usersys.redhat.com, E=buildnss02-sni.usersys.redhat.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #149: Generate Cert Request for buildnss02-sni.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02-sni.usersys.redhat.com's Request --------------------------
certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o buildnss02-sni.usersys.redhat.com.cert -f ../tests.pw 
cert.sh: #150: Sign buildnss02-sni.usersys.redhat.com's Request - PASSED
cert.sh: Import buildnss02-sni.usersys.redhat.com's Cert --------------------------
certutil -A -n buildnss02-sni.usersys.redhat.com -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -i buildnss02-sni.usersys.redhat.com.cert
cert.sh: #151: Import buildnss02-sni.usersys.redhat.com's Cert - PASSED
cert.sh SUCCESS: buildnss02-sni.usersys.redhat.com's Cert Created
cert.sh: Generate EC Cert Request for buildnss02-sni.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02-sni.usersys.redhat.com, E=buildnss02-sni.usersys.redhat.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #152: Generate EC Cert Request for buildnss02-sni.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02-sni.usersys.redhat.com's EC Request --------------------------
certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o buildnss02-sni.usersys.redhat.com-ec.cert -f ../tests.pw 
cert.sh: #153: Sign buildnss02-sni.usersys.redhat.com's EC Request - PASSED
cert.sh: Import buildnss02-sni.usersys.redhat.com's EC Cert --------------------------
certutil -A -n buildnss02-sni.usersys.redhat.com-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -i buildnss02-sni.usersys.redhat.com-ec.cert
cert.sh: #154: Import buildnss02-sni.usersys.redhat.com's EC Cert - PASSED
cert.sh SUCCESS: buildnss02-sni.usersys.redhat.com's EC Cert Created
cert.sh: Generate mixed EC Cert Request for buildnss02-sni.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02-sni.usersys.redhat.com, E=buildnss02-sni.usersys.redhat.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #155: Generate mixed EC Cert Request for buildnss02-sni.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02-sni.usersys.redhat.com's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o buildnss02-sni.usersys.redhat.com-ecmixed.cert -f ../tests.pw 
cert.sh: #156: Sign buildnss02-sni.usersys.redhat.com's EC Request with RSA - PASSED
cert.sh: Import buildnss02-sni.usersys.redhat.com's mixed EC Cert --------------------------
certutil -A -n buildnss02-sni.usersys.redhat.com-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw -i buildnss02-sni.usersys.redhat.com-ecmixed.cert
cert.sh: #157: Import buildnss02-sni.usersys.redhat.com's mixed EC Cert - PASSED
cert.sh SUCCESS: buildnss02-sni.usersys.redhat.com's mixed EC Cert Created
cert.sh: Modify trust attributes of Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA -t TC,TC,TC -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw
cert.sh: #158: Modify trust attributes of Root CA -t TC,TC,TC - PASSED
cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA-ec -t TC,TC,TC -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -f ../tests.pw
cert.sh: #159: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED
cert.sh SUCCESS: SSL passed
cert.sh: Creating Client CA Issued Certificates ==============
cert.sh: Initializing Alice's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/alicedir -f ../tests.pw
cert.sh: #160: Initializing Alice's Cert DB - PASSED
cert.sh: Loading root cert module to Alice's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/alicedir

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #161: Loading root cert module to Alice's Cert DB - PASSED
cert.sh: Import Root CA for Alice --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/alicedir -i ../CA/TestCA.ca.cert
cert.sh: #162: Import Root CA for Alice - PASSED
cert.sh: Import EC Root CA for Alice --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/alicedir -i ../CA/TestCA-ec.ca.cert
cert.sh: #163: Import EC Root CA for Alice - PASSED
cert.sh: Generate Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #164: Generate Cert Request for Alice - PASSED
cert.sh: Sign Alice's Request --------------------------
certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw 
cert.sh: #165: Sign Alice's Request - PASSED
cert.sh: Import Alice's Cert --------------------------
certutil -A -n Alice -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/alicedir -f ../tests.pw -i Alice.cert
cert.sh: #166: Import Alice's Cert - PASSED
cert.sh SUCCESS: Alice's Cert Created
cert.sh: Generate EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #167: Generate EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request --------------------------
certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw 
cert.sh: #168: Sign Alice's EC Request - PASSED
cert.sh: Import Alice's EC Cert --------------------------
certutil -A -n Alice-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/alicedir -f ../tests.pw -i Alice-ec.cert
cert.sh: #169: Import Alice's EC Cert - PASSED
cert.sh SUCCESS: Alice's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #170: Generate mixed EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw 
cert.sh: #171: Sign Alice's EC Request with RSA - PASSED
cert.sh: Import Alice's mixed EC Cert --------------------------
certutil -A -n Alice-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/alicedir -f ../tests.pw -i Alice-ecmixed.cert
cert.sh: #172: Import Alice's mixed EC Cert - PASSED
cert.sh SUCCESS: Alice's mixed EC Cert Created
cert.sh: Initializing Bob's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/bobdir -f ../tests.pw
cert.sh: #173: Initializing Bob's Cert DB - PASSED
cert.sh: Loading root cert module to Bob's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/bobdir

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #174: Loading root cert module to Bob's Cert DB - PASSED
cert.sh: Import Root CA for Bob --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/bobdir -i ../CA/TestCA.ca.cert
cert.sh: #175: Import Root CA for Bob - PASSED
cert.sh: Import EC Root CA for Bob --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/bobdir -i ../CA/TestCA-ec.ca.cert
cert.sh: #176: Import EC Root CA for Bob - PASSED
cert.sh: Generate Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #177: Generate Cert Request for Bob - PASSED
cert.sh: Sign Bob's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw 
cert.sh: #178: Sign Bob's Request - PASSED
cert.sh: Import Bob's Cert --------------------------
certutil -A -n Bob -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/bobdir -f ../tests.pw -i Bob.cert
cert.sh: #179: Import Bob's Cert - PASSED
cert.sh SUCCESS: Bob's Cert Created
cert.sh: Generate EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #180: Generate EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw 
cert.sh: #181: Sign Bob's EC Request - PASSED
cert.sh: Import Bob's EC Cert --------------------------
certutil -A -n Bob-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/bobdir -f ../tests.pw -i Bob-ec.cert
cert.sh: #182: Import Bob's EC Cert - PASSED
cert.sh SUCCESS: Bob's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #183: Generate mixed EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw 
cert.sh: #184: Sign Bob's EC Request with RSA - PASSED
cert.sh: Import Bob's mixed EC Cert --------------------------
certutil -A -n Bob-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/bobdir -f ../tests.pw -i Bob-ecmixed.cert
cert.sh: #185: Import Bob's mixed EC Cert - PASSED
cert.sh SUCCESS: Bob's mixed EC Cert Created
cert.sh: Creating Dave's Certificate -------------------------
cert.sh: Initializing Dave's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dave -f ../tests.pw
cert.sh: #186: Initializing Dave's Cert DB - PASSED
cert.sh: Loading root cert module to Dave's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dave

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #187: Loading root cert module to Dave's Cert DB - PASSED
cert.sh: Import Root CA for Dave --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dave -i ../CA/TestCA.ca.cert
cert.sh: #188: Import Root CA for Dave - PASSED
cert.sh: Import EC Root CA for Dave --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dave -i ../CA/TestCA-ec.ca.cert
cert.sh: #189: Import EC Root CA for Dave - PASSED
cert.sh: Generate Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #190: Generate Cert Request for Dave - PASSED
cert.sh: Sign Dave's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw 
cert.sh: #191: Sign Dave's Request - PASSED
cert.sh: Import Dave's Cert --------------------------
certutil -A -n Dave -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dave -f ../tests.pw -i Dave.cert
cert.sh: #192: Import Dave's Cert - PASSED
cert.sh SUCCESS: Dave's Cert Created
cert.sh: Generate EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #193: Generate EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw 
cert.sh: #194: Sign Dave's EC Request - PASSED
cert.sh: Import Dave's EC Cert --------------------------
certutil -A -n Dave-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dave -f ../tests.pw -i Dave-ec.cert
cert.sh: #195: Import Dave's EC Cert - PASSED
cert.sh SUCCESS: Dave's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #196: Generate mixed EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw 
cert.sh: #197: Sign Dave's EC Request with RSA - PASSED
cert.sh: Import Dave's mixed EC Cert --------------------------
certutil -A -n Dave-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dave -f ../tests.pw -i Dave-ecmixed.cert
cert.sh: #198: Import Dave's mixed EC Cert - PASSED
cert.sh SUCCESS: Dave's mixed EC Cert Created
cert.sh: Creating multiEmail's Certificate --------------------
cert.sh: Initializing Eve's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eve -f ../tests.pw
cert.sh: #199: Initializing Eve's Cert DB - PASSED
cert.sh: Loading root cert module to Eve's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eve

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #200: Loading root cert module to Eve's Cert DB - PASSED
cert.sh: Import Root CA for Eve --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eve -i ../CA/TestCA.ca.cert
cert.sh: #201: Import Root CA for Eve - PASSED
cert.sh: Import EC Root CA for Eve --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eve -i ../CA/TestCA-ec.ca.cert
cert.sh: #202: Import EC Root CA for Eve - PASSED
cert.sh: Generate Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #203: Generate Cert Request for Eve - PASSED
cert.sh: Sign Eve's Request --------------------------
certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #204: Sign Eve's Request - PASSED
cert.sh: Import Eve's Cert --------------------------
certutil -A -n Eve -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eve -f ../tests.pw -i Eve.cert
cert.sh: #205: Import Eve's Cert - PASSED
cert.sh SUCCESS: Eve's Cert Created
cert.sh: Generate EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #206: Generate EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request --------------------------
certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #207: Sign Eve's EC Request - PASSED
cert.sh: Import Eve's EC Cert --------------------------
certutil -A -n Eve-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eve -f ../tests.pw -i Eve-ec.cert
cert.sh: #208: Import Eve's EC Cert - PASSED
cert.sh SUCCESS: Eve's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #209: Generate mixed EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #210: Sign Eve's EC Request with RSA - PASSED
cert.sh: Import Eve's mixed EC Cert --------------------------
certutil -A -n Eve-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eve -f ../tests.pw -i Eve-ecmixed.cert
cert.sh: #211: Import Eve's mixed EC Cert - PASSED
cert.sh SUCCESS: Eve's mixed EC Cert Created
cert.sh: Importing Certificates ==============================
cert.sh: Import Bob's cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert
cert.sh: #212: Import Bob's cert into Alice's db - PASSED
cert.sh: Import Dave's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #213: Import Dave's cert into Alice's DB - PASSED
cert.sh: Import Dave's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #214: Import Dave's cert into Bob's DB - PASSED
cert.sh: Import Eve's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #215: Import Eve's cert into Alice's DB - PASSED
cert.sh: Import Eve's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #216: Import Eve's cert into Bob's DB - PASSED
cert.sh: Importing EC Certificates ==============================
cert.sh: Import Bob's EC cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert
cert.sh: #217: Import Bob's EC cert into Alice's db - PASSED
cert.sh: Import Dave's EC cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #218: Import Dave's EC cert into Alice's DB - PASSED
cert.sh: Import Dave's EC cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #219: Import Dave's EC cert into Bob's DB - PASSED
cert.sh SUCCESS: SMIME passed
cert.sh: Creating FIPS 140 DSA Certificates ==============
cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips -f ../tests.fipspw
cert.sh: #220: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED
cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #221: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED
cert.sh: Enable FIPS mode on database -----------------------
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips -fips true 

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
FIPS mode enabled.
cert.sh: #222: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED
cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate --------------------------
certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise


Generating key.  This may take a few moments...

cert.sh: #223: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED
cert.sh SUCCESS: FIPS passed
cert.sh: Creating Server CA Issued Certificate for 
             EC Curves Test Certificates ------------------------------------
cert.sh: Initializing EC Curve's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw
cert.sh: #224: Initializing EC Curve's Cert DB - PASSED
cert.sh: Loading root cert module to EC Curve's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #225: Loading root cert module to EC Curve's Cert DB - PASSED
cert.sh: Import EC Root CA for EC Curves Test Certificates --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -i ../CA/TestCA-ec.ca.cert
cert.sh: #226: Import EC Root CA for EC Curves Test Certificates - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v1 --------------------------
certutil -s "CN=Curve-c2pnb163v1, E=Curve-c2pnb163v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #227: Generate EC Cert Request for Curve-c2pnb163v1 - PASSED
cert.sh: Sign Curve-c2pnb163v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-c2pnb163v1-ec.cert -f ../tests.pw 
cert.sh: #228: Sign Curve-c2pnb163v1's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v1's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2pnb163v1-ec.cert
cert.sh: #229: Import Curve-c2pnb163v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v2 --------------------------
certutil -s "CN=Curve-c2pnb163v2, E=Curve-c2pnb163v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #230: Generate EC Cert Request for Curve-c2pnb163v2 - PASSED
cert.sh: Sign Curve-c2pnb163v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-c2pnb163v2-ec.cert -f ../tests.pw 
cert.sh: #231: Sign Curve-c2pnb163v2's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v2's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2pnb163v2-ec.cert
cert.sh: #232: Import Curve-c2pnb163v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v3 --------------------------
certutil -s "CN=Curve-c2pnb163v3, E=Curve-c2pnb163v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #233: Generate EC Cert Request for Curve-c2pnb163v3 - PASSED
cert.sh: Sign Curve-c2pnb163v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-c2pnb163v3-ec.cert -f ../tests.pw 
cert.sh: #234: Sign Curve-c2pnb163v3's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v3's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2pnb163v3-ec.cert
cert.sh: #235: Import Curve-c2pnb163v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb176v1 --------------------------
certutil -s "CN=Curve-c2pnb176v1, E=Curve-c2pnb176v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb176v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #236: Generate EC Cert Request for Curve-c2pnb176v1 - PASSED
cert.sh: Sign Curve-c2pnb176v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2004 -v 60 -d ../CA -i req -o Curve-c2pnb176v1-ec.cert -f ../tests.pw 
cert.sh: #237: Sign Curve-c2pnb176v1's EC Request - PASSED
cert.sh: Import Curve-c2pnb176v1's EC Cert --------------------------
certutil -A -n Curve-c2pnb176v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2pnb176v1-ec.cert
cert.sh: #238: Import Curve-c2pnb176v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb208w1 --------------------------
certutil -s "CN=Curve-c2pnb208w1, E=Curve-c2pnb208w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb208w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #239: Generate EC Cert Request for Curve-c2pnb208w1 - PASSED
cert.sh: Sign Curve-c2pnb208w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2005 -v 60 -d ../CA -i req -o Curve-c2pnb208w1-ec.cert -f ../tests.pw 
cert.sh: #240: Sign Curve-c2pnb208w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb208w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb208w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2pnb208w1-ec.cert
cert.sh: #241: Import Curve-c2pnb208w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb272w1 --------------------------
certutil -s "CN=Curve-c2pnb272w1, E=Curve-c2pnb272w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb272w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #242: Generate EC Cert Request for Curve-c2pnb272w1 - PASSED
cert.sh: Sign Curve-c2pnb272w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2006 -v 60 -d ../CA -i req -o Curve-c2pnb272w1-ec.cert -f ../tests.pw 
cert.sh: #243: Sign Curve-c2pnb272w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb272w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb272w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2pnb272w1-ec.cert
cert.sh: #244: Import Curve-c2pnb272w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb304w1 --------------------------
certutil -s "CN=Curve-c2pnb304w1, E=Curve-c2pnb304w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb304w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #245: Generate EC Cert Request for Curve-c2pnb304w1 - PASSED
cert.sh: Sign Curve-c2pnb304w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2007 -v 60 -d ../CA -i req -o Curve-c2pnb304w1-ec.cert -f ../tests.pw 
cert.sh: #246: Sign Curve-c2pnb304w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb304w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb304w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2pnb304w1-ec.cert
cert.sh: #247: Import Curve-c2pnb304w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb368w1 --------------------------
certutil -s "CN=Curve-c2pnb368w1, E=Curve-c2pnb368w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb368w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #248: Generate EC Cert Request for Curve-c2pnb368w1 - PASSED
cert.sh: Sign Curve-c2pnb368w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2008 -v 60 -d ../CA -i req -o Curve-c2pnb368w1-ec.cert -f ../tests.pw 
cert.sh: #249: Sign Curve-c2pnb368w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb368w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb368w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2pnb368w1-ec.cert
cert.sh: #250: Import Curve-c2pnb368w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v1 --------------------------
certutil -s "CN=Curve-c2tnb191v1, E=Curve-c2tnb191v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #251: Generate EC Cert Request for Curve-c2tnb191v1 - PASSED
cert.sh: Sign Curve-c2tnb191v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2009 -v 60 -d ../CA -i req -o Curve-c2tnb191v1-ec.cert -f ../tests.pw 
cert.sh: #252: Sign Curve-c2tnb191v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2tnb191v1-ec.cert
cert.sh: #253: Import Curve-c2tnb191v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v2 --------------------------
certutil -s "CN=Curve-c2tnb191v2, E=Curve-c2tnb191v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #254: Generate EC Cert Request for Curve-c2tnb191v2 - PASSED
cert.sh: Sign Curve-c2tnb191v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2010 -v 60 -d ../CA -i req -o Curve-c2tnb191v2-ec.cert -f ../tests.pw 
cert.sh: #255: Sign Curve-c2tnb191v2's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v2's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2tnb191v2-ec.cert
cert.sh: #256: Import Curve-c2tnb191v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v3 --------------------------
certutil -s "CN=Curve-c2tnb191v3, E=Curve-c2tnb191v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #257: Generate EC Cert Request for Curve-c2tnb191v3 - PASSED
cert.sh: Sign Curve-c2tnb191v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2011 -v 60 -d ../CA -i req -o Curve-c2tnb191v3-ec.cert -f ../tests.pw 
cert.sh: #258: Sign Curve-c2tnb191v3's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v3's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2tnb191v3-ec.cert
cert.sh: #259: Import Curve-c2tnb191v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v1 --------------------------
certutil -s "CN=Curve-c2tnb239v1, E=Curve-c2tnb239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #260: Generate EC Cert Request for Curve-c2tnb239v1 - PASSED
cert.sh: Sign Curve-c2tnb239v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2012 -v 60 -d ../CA -i req -o Curve-c2tnb239v1-ec.cert -f ../tests.pw 
cert.sh: #261: Sign Curve-c2tnb239v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2tnb239v1-ec.cert
cert.sh: #262: Import Curve-c2tnb239v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v2 --------------------------
certutil -s "CN=Curve-c2tnb239v2, E=Curve-c2tnb239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #263: Generate EC Cert Request for Curve-c2tnb239v2 - PASSED
cert.sh: Sign Curve-c2tnb239v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2013 -v 60 -d ../CA -i req -o Curve-c2tnb239v2-ec.cert -f ../tests.pw 
cert.sh: #264: Sign Curve-c2tnb239v2's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v2's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2tnb239v2-ec.cert
cert.sh: #265: Import Curve-c2tnb239v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v3 --------------------------
certutil -s "CN=Curve-c2tnb239v3, E=Curve-c2tnb239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #266: Generate EC Cert Request for Curve-c2tnb239v3 - PASSED
cert.sh: Sign Curve-c2tnb239v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2014 -v 60 -d ../CA -i req -o Curve-c2tnb239v3-ec.cert -f ../tests.pw 
cert.sh: #267: Sign Curve-c2tnb239v3's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v3's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2tnb239v3-ec.cert
cert.sh: #268: Import Curve-c2tnb239v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb359v1 --------------------------
certutil -s "CN=Curve-c2tnb359v1, E=Curve-c2tnb359v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb359v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #269: Generate EC Cert Request for Curve-c2tnb359v1 - PASSED
cert.sh: Sign Curve-c2tnb359v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2015 -v 60 -d ../CA -i req -o Curve-c2tnb359v1-ec.cert -f ../tests.pw 
cert.sh: #270: Sign Curve-c2tnb359v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb359v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb359v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2tnb359v1-ec.cert
cert.sh: #271: Import Curve-c2tnb359v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb431r1 --------------------------
certutil -s "CN=Curve-c2tnb431r1, E=Curve-c2tnb431r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb431r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #272: Generate EC Cert Request for Curve-c2tnb431r1 - PASSED
cert.sh: Sign Curve-c2tnb431r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2016 -v 60 -d ../CA -i req -o Curve-c2tnb431r1-ec.cert -f ../tests.pw 
cert.sh: #273: Sign Curve-c2tnb431r1's EC Request - PASSED
cert.sh: Import Curve-c2tnb431r1's EC Cert --------------------------
certutil -A -n Curve-c2tnb431r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-c2tnb431r1-ec.cert
cert.sh: #274: Import Curve-c2tnb431r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb163 --------------------------
certutil -s "CN=Curve-nistb163, E=Curve-nistb163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb163 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #275: Generate EC Cert Request for Curve-nistb163 - PASSED
cert.sh: Sign Curve-nistb163's EC Request --------------------------
certutil -C -c TestCA-ec -m 2017 -v 60 -d ../CA -i req -o Curve-nistb163-ec.cert -f ../tests.pw 
cert.sh: #276: Sign Curve-nistb163's EC Request - PASSED
cert.sh: Import Curve-nistb163's EC Cert --------------------------
certutil -A -n Curve-nistb163-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistb163-ec.cert
cert.sh: #277: Import Curve-nistb163's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb233 --------------------------
certutil -s "CN=Curve-nistb233, E=Curve-nistb233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb233 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #278: Generate EC Cert Request for Curve-nistb233 - PASSED
cert.sh: Sign Curve-nistb233's EC Request --------------------------
certutil -C -c TestCA-ec -m 2018 -v 60 -d ../CA -i req -o Curve-nistb233-ec.cert -f ../tests.pw 
cert.sh: #279: Sign Curve-nistb233's EC Request - PASSED
cert.sh: Import Curve-nistb233's EC Cert --------------------------
certutil -A -n Curve-nistb233-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistb233-ec.cert
cert.sh: #280: Import Curve-nistb233's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb283 --------------------------
certutil -s "CN=Curve-nistb283, E=Curve-nistb283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb283 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #281: Generate EC Cert Request for Curve-nistb283 - PASSED
cert.sh: Sign Curve-nistb283's EC Request --------------------------
certutil -C -c TestCA-ec -m 2019 -v 60 -d ../CA -i req -o Curve-nistb283-ec.cert -f ../tests.pw 
cert.sh: #282: Sign Curve-nistb283's EC Request - PASSED
cert.sh: Import Curve-nistb283's EC Cert --------------------------
certutil -A -n Curve-nistb283-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistb283-ec.cert
cert.sh: #283: Import Curve-nistb283's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb409 --------------------------
certutil -s "CN=Curve-nistb409, E=Curve-nistb409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb409 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #284: Generate EC Cert Request for Curve-nistb409 - PASSED
cert.sh: Sign Curve-nistb409's EC Request --------------------------
certutil -C -c TestCA-ec -m 2020 -v 60 -d ../CA -i req -o Curve-nistb409-ec.cert -f ../tests.pw 
cert.sh: #285: Sign Curve-nistb409's EC Request - PASSED
cert.sh: Import Curve-nistb409's EC Cert --------------------------
certutil -A -n Curve-nistb409-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistb409-ec.cert
cert.sh: #286: Import Curve-nistb409's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb571 --------------------------
certutil -s "CN=Curve-nistb571, E=Curve-nistb571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb571 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #287: Generate EC Cert Request for Curve-nistb571 - PASSED
cert.sh: Sign Curve-nistb571's EC Request --------------------------
certutil -C -c TestCA-ec -m 2021 -v 60 -d ../CA -i req -o Curve-nistb571-ec.cert -f ../tests.pw 
cert.sh: #288: Sign Curve-nistb571's EC Request - PASSED
cert.sh: Import Curve-nistb571's EC Cert --------------------------
certutil -A -n Curve-nistb571-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistb571-ec.cert
cert.sh: #289: Import Curve-nistb571's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk163 --------------------------
certutil -s "CN=Curve-nistk163, E=Curve-nistk163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk163 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #290: Generate EC Cert Request for Curve-nistk163 - PASSED
cert.sh: Sign Curve-nistk163's EC Request --------------------------
certutil -C -c TestCA-ec -m 2022 -v 60 -d ../CA -i req -o Curve-nistk163-ec.cert -f ../tests.pw 
cert.sh: #291: Sign Curve-nistk163's EC Request - PASSED
cert.sh: Import Curve-nistk163's EC Cert --------------------------
certutil -A -n Curve-nistk163-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistk163-ec.cert
cert.sh: #292: Import Curve-nistk163's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk233 --------------------------
certutil -s "CN=Curve-nistk233, E=Curve-nistk233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk233 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #293: Generate EC Cert Request for Curve-nistk233 - PASSED
cert.sh: Sign Curve-nistk233's EC Request --------------------------
certutil -C -c TestCA-ec -m 2023 -v 60 -d ../CA -i req -o Curve-nistk233-ec.cert -f ../tests.pw 
cert.sh: #294: Sign Curve-nistk233's EC Request - PASSED
cert.sh: Import Curve-nistk233's EC Cert --------------------------
certutil -A -n Curve-nistk233-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistk233-ec.cert
cert.sh: #295: Import Curve-nistk233's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk283 --------------------------
certutil -s "CN=Curve-nistk283, E=Curve-nistk283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk283 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #296: Generate EC Cert Request for Curve-nistk283 - PASSED
cert.sh: Sign Curve-nistk283's EC Request --------------------------
certutil -C -c TestCA-ec -m 2024 -v 60 -d ../CA -i req -o Curve-nistk283-ec.cert -f ../tests.pw 
cert.sh: #297: Sign Curve-nistk283's EC Request - PASSED
cert.sh: Import Curve-nistk283's EC Cert --------------------------
certutil -A -n Curve-nistk283-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistk283-ec.cert
cert.sh: #298: Import Curve-nistk283's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk409 --------------------------
certutil -s "CN=Curve-nistk409, E=Curve-nistk409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk409 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #299: Generate EC Cert Request for Curve-nistk409 - PASSED
cert.sh: Sign Curve-nistk409's EC Request --------------------------
certutil -C -c TestCA-ec -m 2025 -v 60 -d ../CA -i req -o Curve-nistk409-ec.cert -f ../tests.pw 
cert.sh: #300: Sign Curve-nistk409's EC Request - PASSED
cert.sh: Import Curve-nistk409's EC Cert --------------------------
certutil -A -n Curve-nistk409-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistk409-ec.cert
cert.sh: #301: Import Curve-nistk409's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk571 --------------------------
certutil -s "CN=Curve-nistk571, E=Curve-nistk571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk571 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #302: Generate EC Cert Request for Curve-nistk571 - PASSED
cert.sh: Sign Curve-nistk571's EC Request --------------------------
certutil -C -c TestCA-ec -m 2026 -v 60 -d ../CA -i req -o Curve-nistk571-ec.cert -f ../tests.pw 
cert.sh: #303: Sign Curve-nistk571's EC Request - PASSED
cert.sh: Import Curve-nistk571's EC Cert --------------------------
certutil -A -n Curve-nistk571-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistk571-ec.cert
cert.sh: #304: Import Curve-nistk571's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp192 --------------------------
certutil -s "CN=Curve-nistp192, E=Curve-nistp192-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp192 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #305: Generate EC Cert Request for Curve-nistp192 - PASSED
cert.sh: Sign Curve-nistp192's EC Request --------------------------
certutil -C -c TestCA-ec -m 2027 -v 60 -d ../CA -i req -o Curve-nistp192-ec.cert -f ../tests.pw 
cert.sh: #306: Sign Curve-nistp192's EC Request - PASSED
cert.sh: Import Curve-nistp192's EC Cert --------------------------
certutil -A -n Curve-nistp192-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistp192-ec.cert
cert.sh: #307: Import Curve-nistp192's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp224 --------------------------
certutil -s "CN=Curve-nistp224, E=Curve-nistp224-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp224 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #308: Generate EC Cert Request for Curve-nistp224 - PASSED
cert.sh: Sign Curve-nistp224's EC Request --------------------------
certutil -C -c TestCA-ec -m 2028 -v 60 -d ../CA -i req -o Curve-nistp224-ec.cert -f ../tests.pw 
cert.sh: #309: Sign Curve-nistp224's EC Request - PASSED
cert.sh: Import Curve-nistp224's EC Cert --------------------------
certutil -A -n Curve-nistp224-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistp224-ec.cert
cert.sh: #310: Import Curve-nistp224's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp256 --------------------------
certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #311: Generate EC Cert Request for Curve-nistp256 - PASSED
cert.sh: Sign Curve-nistp256's EC Request --------------------------
certutil -C -c TestCA-ec -m 2029 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw 
cert.sh: #312: Sign Curve-nistp256's EC Request - PASSED
cert.sh: Import Curve-nistp256's EC Cert --------------------------
certutil -A -n Curve-nistp256-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert
cert.sh: #313: Import Curve-nistp256's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp384 --------------------------
certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #314: Generate EC Cert Request for Curve-nistp384 - PASSED
cert.sh: Sign Curve-nistp384's EC Request --------------------------
certutil -C -c TestCA-ec -m 2030 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw 
cert.sh: #315: Sign Curve-nistp384's EC Request - PASSED
cert.sh: Import Curve-nistp384's EC Cert --------------------------
certutil -A -n Curve-nistp384-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert
cert.sh: #316: Import Curve-nistp384's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp521 --------------------------
certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #317: Generate EC Cert Request for Curve-nistp521 - PASSED
cert.sh: Sign Curve-nistp521's EC Request --------------------------
certutil -C -c TestCA-ec -m 2031 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw 
cert.sh: #318: Sign Curve-nistp521's EC Request - PASSED
cert.sh: Import Curve-nistp521's EC Cert --------------------------
certutil -A -n Curve-nistp521-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert
cert.sh: #319: Import Curve-nistp521's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v1 --------------------------
certutil -s "CN=Curve-prime192v1, E=Curve-prime192v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #320: Generate EC Cert Request for Curve-prime192v1 - PASSED
cert.sh: Sign Curve-prime192v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2032 -v 60 -d ../CA -i req -o Curve-prime192v1-ec.cert -f ../tests.pw 
cert.sh: #321: Sign Curve-prime192v1's EC Request - PASSED
cert.sh: Import Curve-prime192v1's EC Cert --------------------------
certutil -A -n Curve-prime192v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-prime192v1-ec.cert
cert.sh: #322: Import Curve-prime192v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v2 --------------------------
certutil -s "CN=Curve-prime192v2, E=Curve-prime192v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #323: Generate EC Cert Request for Curve-prime192v2 - PASSED
cert.sh: Sign Curve-prime192v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2033 -v 60 -d ../CA -i req -o Curve-prime192v2-ec.cert -f ../tests.pw 
cert.sh: #324: Sign Curve-prime192v2's EC Request - PASSED
cert.sh: Import Curve-prime192v2's EC Cert --------------------------
certutil -A -n Curve-prime192v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-prime192v2-ec.cert
cert.sh: #325: Import Curve-prime192v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v3 --------------------------
certutil -s "CN=Curve-prime192v3, E=Curve-prime192v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #326: Generate EC Cert Request for Curve-prime192v3 - PASSED
cert.sh: Sign Curve-prime192v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2034 -v 60 -d ../CA -i req -o Curve-prime192v3-ec.cert -f ../tests.pw 
cert.sh: #327: Sign Curve-prime192v3's EC Request - PASSED
cert.sh: Import Curve-prime192v3's EC Cert --------------------------
certutil -A -n Curve-prime192v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-prime192v3-ec.cert
cert.sh: #328: Import Curve-prime192v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v1 --------------------------
certutil -s "CN=Curve-prime239v1, E=Curve-prime239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #329: Generate EC Cert Request for Curve-prime239v1 - PASSED
cert.sh: Sign Curve-prime239v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2035 -v 60 -d ../CA -i req -o Curve-prime239v1-ec.cert -f ../tests.pw 
cert.sh: #330: Sign Curve-prime239v1's EC Request - PASSED
cert.sh: Import Curve-prime239v1's EC Cert --------------------------
certutil -A -n Curve-prime239v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-prime239v1-ec.cert
cert.sh: #331: Import Curve-prime239v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v2 --------------------------
certutil -s "CN=Curve-prime239v2, E=Curve-prime239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #332: Generate EC Cert Request for Curve-prime239v2 - PASSED
cert.sh: Sign Curve-prime239v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2036 -v 60 -d ../CA -i req -o Curve-prime239v2-ec.cert -f ../tests.pw 
cert.sh: #333: Sign Curve-prime239v2's EC Request - PASSED
cert.sh: Import Curve-prime239v2's EC Cert --------------------------
certutil -A -n Curve-prime239v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-prime239v2-ec.cert
cert.sh: #334: Import Curve-prime239v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v3 --------------------------
certutil -s "CN=Curve-prime239v3, E=Curve-prime239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #335: Generate EC Cert Request for Curve-prime239v3 - PASSED
cert.sh: Sign Curve-prime239v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2037 -v 60 -d ../CA -i req -o Curve-prime239v3-ec.cert -f ../tests.pw 
cert.sh: #336: Sign Curve-prime239v3's EC Request - PASSED
cert.sh: Import Curve-prime239v3's EC Cert --------------------------
certutil -A -n Curve-prime239v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-prime239v3-ec.cert
cert.sh: #337: Import Curve-prime239v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp112r1 --------------------------
certutil -s "CN=Curve-secp112r1, E=Curve-secp112r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #338: Generate EC Cert Request for Curve-secp112r1 - PASSED
cert.sh: Sign Curve-secp112r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2038 -v 60 -d ../CA -i req -o Curve-secp112r1-ec.cert -f ../tests.pw 
cert.sh: #339: Sign Curve-secp112r1's EC Request - PASSED
cert.sh: Import Curve-secp112r1's EC Cert --------------------------
certutil -A -n Curve-secp112r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp112r1-ec.cert
cert.sh: #340: Import Curve-secp112r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp112r2 --------------------------
certutil -s "CN=Curve-secp112r2, E=Curve-secp112r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #341: Generate EC Cert Request for Curve-secp112r2 - PASSED
cert.sh: Sign Curve-secp112r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2039 -v 60 -d ../CA -i req -o Curve-secp112r2-ec.cert -f ../tests.pw 
cert.sh: #342: Sign Curve-secp112r2's EC Request - PASSED
cert.sh: Import Curve-secp112r2's EC Cert --------------------------
certutil -A -n Curve-secp112r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp112r2-ec.cert
cert.sh: #343: Import Curve-secp112r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp128r1 --------------------------
certutil -s "CN=Curve-secp128r1, E=Curve-secp128r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #344: Generate EC Cert Request for Curve-secp128r1 - PASSED
cert.sh: Sign Curve-secp128r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2040 -v 60 -d ../CA -i req -o Curve-secp128r1-ec.cert -f ../tests.pw 
cert.sh: #345: Sign Curve-secp128r1's EC Request - PASSED
cert.sh: Import Curve-secp128r1's EC Cert --------------------------
certutil -A -n Curve-secp128r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp128r1-ec.cert
cert.sh: #346: Import Curve-secp128r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp128r2 --------------------------
certutil -s "CN=Curve-secp128r2, E=Curve-secp128r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #347: Generate EC Cert Request for Curve-secp128r2 - PASSED
cert.sh: Sign Curve-secp128r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2041 -v 60 -d ../CA -i req -o Curve-secp128r2-ec.cert -f ../tests.pw 
cert.sh: #348: Sign Curve-secp128r2's EC Request - PASSED
cert.sh: Import Curve-secp128r2's EC Cert --------------------------
certutil -A -n Curve-secp128r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp128r2-ec.cert
cert.sh: #349: Import Curve-secp128r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160k1 --------------------------
certutil -s "CN=Curve-secp160k1, E=Curve-secp160k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #350: Generate EC Cert Request for Curve-secp160k1 - PASSED
cert.sh: Sign Curve-secp160k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2042 -v 60 -d ../CA -i req -o Curve-secp160k1-ec.cert -f ../tests.pw 
cert.sh: #351: Sign Curve-secp160k1's EC Request - PASSED
cert.sh: Import Curve-secp160k1's EC Cert --------------------------
certutil -A -n Curve-secp160k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp160k1-ec.cert
cert.sh: #352: Import Curve-secp160k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160r1 --------------------------
certutil -s "CN=Curve-secp160r1, E=Curve-secp160r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #353: Generate EC Cert Request for Curve-secp160r1 - PASSED
cert.sh: Sign Curve-secp160r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2043 -v 60 -d ../CA -i req -o Curve-secp160r1-ec.cert -f ../tests.pw 
cert.sh: #354: Sign Curve-secp160r1's EC Request - PASSED
cert.sh: Import Curve-secp160r1's EC Cert --------------------------
certutil -A -n Curve-secp160r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp160r1-ec.cert
cert.sh: #355: Import Curve-secp160r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160r2 --------------------------
certutil -s "CN=Curve-secp160r2, E=Curve-secp160r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #356: Generate EC Cert Request for Curve-secp160r2 - PASSED
cert.sh: Sign Curve-secp160r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2044 -v 60 -d ../CA -i req -o Curve-secp160r2-ec.cert -f ../tests.pw 
cert.sh: #357: Sign Curve-secp160r2's EC Request - PASSED
cert.sh: Import Curve-secp160r2's EC Cert --------------------------
certutil -A -n Curve-secp160r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp160r2-ec.cert
cert.sh: #358: Import Curve-secp160r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp192k1 --------------------------
certutil -s "CN=Curve-secp192k1, E=Curve-secp192k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #359: Generate EC Cert Request for Curve-secp192k1 - PASSED
cert.sh: Sign Curve-secp192k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2045 -v 60 -d ../CA -i req -o Curve-secp192k1-ec.cert -f ../tests.pw 
cert.sh: #360: Sign Curve-secp192k1's EC Request - PASSED
cert.sh: Import Curve-secp192k1's EC Cert --------------------------
certutil -A -n Curve-secp192k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp192k1-ec.cert
cert.sh: #361: Import Curve-secp192k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp192r1 --------------------------
certutil -s "CN=Curve-secp192r1, E=Curve-secp192r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #362: Generate EC Cert Request for Curve-secp192r1 - PASSED
cert.sh: Sign Curve-secp192r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2046 -v 60 -d ../CA -i req -o Curve-secp192r1-ec.cert -f ../tests.pw 
cert.sh: #363: Sign Curve-secp192r1's EC Request - PASSED
cert.sh: Import Curve-secp192r1's EC Cert --------------------------
certutil -A -n Curve-secp192r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp192r1-ec.cert
cert.sh: #364: Import Curve-secp192r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp224k1 --------------------------
certutil -s "CN=Curve-secp224k1, E=Curve-secp224k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #365: Generate EC Cert Request for Curve-secp224k1 - PASSED
cert.sh: Sign Curve-secp224k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2047 -v 60 -d ../CA -i req -o Curve-secp224k1-ec.cert -f ../tests.pw 
cert.sh: #366: Sign Curve-secp224k1's EC Request - PASSED
cert.sh: Import Curve-secp224k1's EC Cert --------------------------
certutil -A -n Curve-secp224k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp224k1-ec.cert
cert.sh: #367: Import Curve-secp224k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp224r1 --------------------------
certutil -s "CN=Curve-secp224r1, E=Curve-secp224r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #368: Generate EC Cert Request for Curve-secp224r1 - PASSED
cert.sh: Sign Curve-secp224r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2048 -v 60 -d ../CA -i req -o Curve-secp224r1-ec.cert -f ../tests.pw 
cert.sh: #369: Sign Curve-secp224r1's EC Request - PASSED
cert.sh: Import Curve-secp224r1's EC Cert --------------------------
certutil -A -n Curve-secp224r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp224r1-ec.cert
cert.sh: #370: Import Curve-secp224r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp256k1 --------------------------
certutil -s "CN=Curve-secp256k1, E=Curve-secp256k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #371: Generate EC Cert Request for Curve-secp256k1 - PASSED
cert.sh: Sign Curve-secp256k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2049 -v 60 -d ../CA -i req -o Curve-secp256k1-ec.cert -f ../tests.pw 
cert.sh: #372: Sign Curve-secp256k1's EC Request - PASSED
cert.sh: Import Curve-secp256k1's EC Cert --------------------------
certutil -A -n Curve-secp256k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp256k1-ec.cert
cert.sh: #373: Import Curve-secp256k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp256r1 --------------------------
certutil -s "CN=Curve-secp256r1, E=Curve-secp256r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #374: Generate EC Cert Request for Curve-secp256r1 - PASSED
cert.sh: Sign Curve-secp256r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2050 -v 60 -d ../CA -i req -o Curve-secp256r1-ec.cert -f ../tests.pw 
cert.sh: #375: Sign Curve-secp256r1's EC Request - PASSED
cert.sh: Import Curve-secp256r1's EC Cert --------------------------
certutil -A -n Curve-secp256r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp256r1-ec.cert
cert.sh: #376: Import Curve-secp256r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp384r1 --------------------------
certutil -s "CN=Curve-secp384r1, E=Curve-secp384r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #377: Generate EC Cert Request for Curve-secp384r1 - PASSED
cert.sh: Sign Curve-secp384r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2051 -v 60 -d ../CA -i req -o Curve-secp384r1-ec.cert -f ../tests.pw 
cert.sh: #378: Sign Curve-secp384r1's EC Request - PASSED
cert.sh: Import Curve-secp384r1's EC Cert --------------------------
certutil -A -n Curve-secp384r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp384r1-ec.cert
cert.sh: #379: Import Curve-secp384r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp521r1 --------------------------
certutil -s "CN=Curve-secp521r1, E=Curve-secp521r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp521r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #380: Generate EC Cert Request for Curve-secp521r1 - PASSED
cert.sh: Sign Curve-secp521r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2052 -v 60 -d ../CA -i req -o Curve-secp521r1-ec.cert -f ../tests.pw 
cert.sh: #381: Sign Curve-secp521r1's EC Request - PASSED
cert.sh: Import Curve-secp521r1's EC Cert --------------------------
certutil -A -n Curve-secp521r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-secp521r1-ec.cert
cert.sh: #382: Import Curve-secp521r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect113r1 --------------------------
certutil -s "CN=Curve-sect113r1, E=Curve-sect113r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #383: Generate EC Cert Request for Curve-sect113r1 - PASSED
cert.sh: Sign Curve-sect113r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2053 -v 60 -d ../CA -i req -o Curve-sect113r1-ec.cert -f ../tests.pw 
cert.sh: #384: Sign Curve-sect113r1's EC Request - PASSED
cert.sh: Import Curve-sect113r1's EC Cert --------------------------
certutil -A -n Curve-sect113r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect113r1-ec.cert
cert.sh: #385: Import Curve-sect113r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect113r2 --------------------------
certutil -s "CN=Curve-sect113r2, E=Curve-sect113r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #386: Generate EC Cert Request for Curve-sect113r2 - PASSED
cert.sh: Sign Curve-sect113r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2054 -v 60 -d ../CA -i req -o Curve-sect113r2-ec.cert -f ../tests.pw 
cert.sh: #387: Sign Curve-sect113r2's EC Request - PASSED
cert.sh: Import Curve-sect113r2's EC Cert --------------------------
certutil -A -n Curve-sect113r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect113r2-ec.cert
cert.sh: #388: Import Curve-sect113r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect131r1 --------------------------
certutil -s "CN=Curve-sect131r1, E=Curve-sect131r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #389: Generate EC Cert Request for Curve-sect131r1 - PASSED
cert.sh: Sign Curve-sect131r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2055 -v 60 -d ../CA -i req -o Curve-sect131r1-ec.cert -f ../tests.pw 
cert.sh: #390: Sign Curve-sect131r1's EC Request - PASSED
cert.sh: Import Curve-sect131r1's EC Cert --------------------------
certutil -A -n Curve-sect131r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect131r1-ec.cert
cert.sh: #391: Import Curve-sect131r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect131r2 --------------------------
certutil -s "CN=Curve-sect131r2, E=Curve-sect131r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #392: Generate EC Cert Request for Curve-sect131r2 - PASSED
cert.sh: Sign Curve-sect131r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2056 -v 60 -d ../CA -i req -o Curve-sect131r2-ec.cert -f ../tests.pw 
cert.sh: #393: Sign Curve-sect131r2's EC Request - PASSED
cert.sh: Import Curve-sect131r2's EC Cert --------------------------
certutil -A -n Curve-sect131r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect131r2-ec.cert
cert.sh: #394: Import Curve-sect131r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163k1 --------------------------
certutil -s "CN=Curve-sect163k1, E=Curve-sect163k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #395: Generate EC Cert Request for Curve-sect163k1 - PASSED
cert.sh: Sign Curve-sect163k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2057 -v 60 -d ../CA -i req -o Curve-sect163k1-ec.cert -f ../tests.pw 
cert.sh: #396: Sign Curve-sect163k1's EC Request - PASSED
cert.sh: Import Curve-sect163k1's EC Cert --------------------------
certutil -A -n Curve-sect163k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect163k1-ec.cert
cert.sh: #397: Import Curve-sect163k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163r1 --------------------------
certutil -s "CN=Curve-sect163r1, E=Curve-sect163r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #398: Generate EC Cert Request for Curve-sect163r1 - PASSED
cert.sh: Sign Curve-sect163r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2058 -v 60 -d ../CA -i req -o Curve-sect163r1-ec.cert -f ../tests.pw 
cert.sh: #399: Sign Curve-sect163r1's EC Request - PASSED
cert.sh: Import Curve-sect163r1's EC Cert --------------------------
certutil -A -n Curve-sect163r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect163r1-ec.cert
cert.sh: #400: Import Curve-sect163r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163r2 --------------------------
certutil -s "CN=Curve-sect163r2, E=Curve-sect163r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #401: Generate EC Cert Request for Curve-sect163r2 - PASSED
cert.sh: Sign Curve-sect163r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2059 -v 60 -d ../CA -i req -o Curve-sect163r2-ec.cert -f ../tests.pw 
cert.sh: #402: Sign Curve-sect163r2's EC Request - PASSED
cert.sh: Import Curve-sect163r2's EC Cert --------------------------
certutil -A -n Curve-sect163r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect163r2-ec.cert
cert.sh: #403: Import Curve-sect163r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect193r1 --------------------------
certutil -s "CN=Curve-sect193r1, E=Curve-sect193r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #404: Generate EC Cert Request for Curve-sect193r1 - PASSED
cert.sh: Sign Curve-sect193r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2060 -v 60 -d ../CA -i req -o Curve-sect193r1-ec.cert -f ../tests.pw 
cert.sh: #405: Sign Curve-sect193r1's EC Request - PASSED
cert.sh: Import Curve-sect193r1's EC Cert --------------------------
certutil -A -n Curve-sect193r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect193r1-ec.cert
cert.sh: #406: Import Curve-sect193r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect193r2 --------------------------
certutil -s "CN=Curve-sect193r2, E=Curve-sect193r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #407: Generate EC Cert Request for Curve-sect193r2 - PASSED
cert.sh: Sign Curve-sect193r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2061 -v 60 -d ../CA -i req -o Curve-sect193r2-ec.cert -f ../tests.pw 
cert.sh: #408: Sign Curve-sect193r2's EC Request - PASSED
cert.sh: Import Curve-sect193r2's EC Cert --------------------------
certutil -A -n Curve-sect193r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect193r2-ec.cert
cert.sh: #409: Import Curve-sect193r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect233k1 --------------------------
certutil -s "CN=Curve-sect233k1, E=Curve-sect233k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #410: Generate EC Cert Request for Curve-sect233k1 - PASSED
cert.sh: Sign Curve-sect233k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2062 -v 60 -d ../CA -i req -o Curve-sect233k1-ec.cert -f ../tests.pw 
cert.sh: #411: Sign Curve-sect233k1's EC Request - PASSED
cert.sh: Import Curve-sect233k1's EC Cert --------------------------
certutil -A -n Curve-sect233k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect233k1-ec.cert
cert.sh: #412: Import Curve-sect233k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect233r1 --------------------------
certutil -s "CN=Curve-sect233r1, E=Curve-sect233r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #413: Generate EC Cert Request for Curve-sect233r1 - PASSED
cert.sh: Sign Curve-sect233r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2063 -v 60 -d ../CA -i req -o Curve-sect233r1-ec.cert -f ../tests.pw 
cert.sh: #414: Sign Curve-sect233r1's EC Request - PASSED
cert.sh: Import Curve-sect233r1's EC Cert --------------------------
certutil -A -n Curve-sect233r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect233r1-ec.cert
cert.sh: #415: Import Curve-sect233r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect239k1 --------------------------
certutil -s "CN=Curve-sect239k1, E=Curve-sect239k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect239k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #416: Generate EC Cert Request for Curve-sect239k1 - PASSED
cert.sh: Sign Curve-sect239k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2064 -v 60 -d ../CA -i req -o Curve-sect239k1-ec.cert -f ../tests.pw 
cert.sh: #417: Sign Curve-sect239k1's EC Request - PASSED
cert.sh: Import Curve-sect239k1's EC Cert --------------------------
certutil -A -n Curve-sect239k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect239k1-ec.cert
cert.sh: #418: Import Curve-sect239k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect283k1 --------------------------
certutil -s "CN=Curve-sect283k1, E=Curve-sect283k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #419: Generate EC Cert Request for Curve-sect283k1 - PASSED
cert.sh: Sign Curve-sect283k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2065 -v 60 -d ../CA -i req -o Curve-sect283k1-ec.cert -f ../tests.pw 
cert.sh: #420: Sign Curve-sect283k1's EC Request - PASSED
cert.sh: Import Curve-sect283k1's EC Cert --------------------------
certutil -A -n Curve-sect283k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect283k1-ec.cert
cert.sh: #421: Import Curve-sect283k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect283r1 --------------------------
certutil -s "CN=Curve-sect283r1, E=Curve-sect283r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #422: Generate EC Cert Request for Curve-sect283r1 - PASSED
cert.sh: Sign Curve-sect283r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2066 -v 60 -d ../CA -i req -o Curve-sect283r1-ec.cert -f ../tests.pw 
cert.sh: #423: Sign Curve-sect283r1's EC Request - PASSED
cert.sh: Import Curve-sect283r1's EC Cert --------------------------
certutil -A -n Curve-sect283r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect283r1-ec.cert
cert.sh: #424: Import Curve-sect283r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect409k1 --------------------------
certutil -s "CN=Curve-sect409k1, E=Curve-sect409k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #425: Generate EC Cert Request for Curve-sect409k1 - PASSED
cert.sh: Sign Curve-sect409k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2067 -v 60 -d ../CA -i req -o Curve-sect409k1-ec.cert -f ../tests.pw 
cert.sh: #426: Sign Curve-sect409k1's EC Request - PASSED
cert.sh: Import Curve-sect409k1's EC Cert --------------------------
certutil -A -n Curve-sect409k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect409k1-ec.cert
cert.sh: #427: Import Curve-sect409k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect409r1 --------------------------
certutil -s "CN=Curve-sect409r1, E=Curve-sect409r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #428: Generate EC Cert Request for Curve-sect409r1 - PASSED
cert.sh: Sign Curve-sect409r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2068 -v 60 -d ../CA -i req -o Curve-sect409r1-ec.cert -f ../tests.pw 
cert.sh: #429: Sign Curve-sect409r1's EC Request - PASSED
cert.sh: Import Curve-sect409r1's EC Cert --------------------------
certutil -A -n Curve-sect409r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect409r1-ec.cert
cert.sh: #430: Import Curve-sect409r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect571k1 --------------------------
certutil -s "CN=Curve-sect571k1, E=Curve-sect571k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #431: Generate EC Cert Request for Curve-sect571k1 - PASSED
cert.sh: Sign Curve-sect571k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2069 -v 60 -d ../CA -i req -o Curve-sect571k1-ec.cert -f ../tests.pw 
cert.sh: #432: Sign Curve-sect571k1's EC Request - PASSED
cert.sh: Import Curve-sect571k1's EC Cert --------------------------
certutil -A -n Curve-sect571k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect571k1-ec.cert
cert.sh: #433: Import Curve-sect571k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect571r1 --------------------------
certutil -s "CN=Curve-sect571r1, E=Curve-sect571r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #434: Generate EC Cert Request for Curve-sect571r1 - PASSED
cert.sh: Sign Curve-sect571r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2070 -v 60 -d ../CA -i req -o Curve-sect571r1-ec.cert -f ../tests.pw 
cert.sh: #435: Sign Curve-sect571r1's EC Request - PASSED
cert.sh: Import Curve-sect571r1's EC Cert --------------------------
certutil -A -n Curve-sect571r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/eccurves -f ../tests.pw -i Curve-sect571r1-ec.cert
cert.sh: #436: Import Curve-sect571r1's EC Cert - PASSED
cert.sh: Initializing TestExt's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -f ../tests.pw
cert.sh: #437: Initializing TestExt's Cert DB - PASSED
cert.sh: Loading root cert module to TestExt's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #438: Loading root cert module to TestExt's Cert DB - PASSED
cert.sh: Import Root CA for TestExt --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -i ../CA/TestCA.ca.cert
cert.sh: #439: Import Root CA for TestExt - PASSED
cert.sh: Import EC Root CA for TestExt --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -i ../CA/TestCA-ec.ca.cert
cert.sh: #440: Import EC Root CA for TestExt - PASSED
cert.sh: Generate Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #441: Generate Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's Request --------------------------
certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw 
cert.sh: #442: Sign TestExt's Request - PASSED
cert.sh: Import TestExt's Cert --------------------------
certutil -A -n TestExt -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -f ../tests.pw -i TestExt.cert
cert.sh: #443: Import TestExt's Cert - PASSED
cert.sh SUCCESS: TestExt's Cert Created
cert.sh: Generate EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #444: Generate EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request --------------------------
certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw 
cert.sh: #445: Sign TestExt's EC Request - PASSED
cert.sh: Import TestExt's EC Cert --------------------------
certutil -A -n TestExt-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -f ../tests.pw -i TestExt-ec.cert
cert.sh: #446: Import TestExt's EC Cert - PASSED
cert.sh SUCCESS: TestExt's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #447: Generate mixed EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw 
cert.sh: #448: Sign TestExt's EC Request with RSA - PASSED
cert.sh: Import TestExt's mixed EC Cert --------------------------
certutil -A -n TestExt-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert
cert.sh: #449: Import TestExt's mixed EC Cert - PASSED
cert.sh SUCCESS: TestExt's mixed EC Cert Created

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt1 -t u,u,u -o /tmp/cert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
n


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt1
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:59:30
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Tue Nov 27 23:55:40 2012
            Not After : Wed Feb 27 23:55:40 2013
        Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:2e:6e:31:c2:3e:fc:c4:b5:1f:44:ca:3d:6f:3a:5e:
                    d7:f2:3f:f8:69:6a:a9:43:5d:84:ef:e2:9e:7f:4d:3e:
                    16:c4:46:3f:b3:50:4a:7f:e7:e7:44:93:43:0d:a8:44:
                    c8:84:c1:c0:32:c3:1d:58:61:d1:c9:09:b5:a4:9d:12:
                    31:f1:c8:61:7a:cc:8c:4a:3e:e3:6e:fa:3a:4f:33:ed:
                    65:57:83:63:df:19:6b:f2:61:e0:3b:c3:27:51:c5:c2:
                    f6:c5:08:a7:e0:90:50:f7:38:be:a3:52:be:90:3e:e1:
                    42:7e:73:24:b1:f6:a6:ae:f9:cf:7e:ae:c6:8b:e5:27
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Usages: Digital Signature
                    Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:a0:55:fb:30:a2:9c:8e:1b:a3:a5:5f:ee:e3:a9:8d:
        03:f8:36:18:67:ec:54:07:be:1f:e2:c6:09:ef:b1:62:
        51:27:5f:aa:ae:45:b6:b9:e8:8d:be:d4:49:de:22:62:
        76:4d:e8:6b:81:b4:58:83:db:b0:ef:c2:c1:d7:bc:a1:
        73:fe:e9:31:e6:c1:01:b5:5b:cf:99:24:38:b6:14:4b:
        8c:d5:01:1a:5a:09:2a:5a:e5:fc:a9:f8:b3:0e:28:09:
        13:c1:3c:17:b5:b7:c3:d0:2f:50:33:2a:54:1c:70:f1:
        79:71:b4:3c:db:40:27:4e:00:ab:d6:fe:e9:58:ac:e9
    Fingerprint (MD5):
        A0:D8:8B:5A:0F:8E:15:1E:A7:AB:4E:E3:B1:ED:10:E8
    Fingerprint (SHA1):
        53:3C:1C:09:AB:74:E2:E4:28:10:55:B0:8C:D7:96:41:BE:2F:76:2F

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #450: Certificate Key Usage Extension (1) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt2 -t u,u,u -o /tmp/cert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt2
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:59:30
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Tue Nov 27 23:55:40 2012
            Not After : Wed Feb 27 23:55:40 2013
        Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9f:bc:45:fd:fd:77:5a:49:0b:7b:37:08:5f:6a:6b:5f:
                    47:be:40:0a:20:df:26:9c:d8:af:d3:bb:3c:74:e4:ce:
                    24:c1:47:a5:e1:28:31:1f:39:49:b8:ad:41:ab:61:e4:
                    2a:3f:fc:cd:74:25:f9:f3:08:78:c2:2f:3d:a8:cc:a6:
                    54:10:65:4d:b9:29:41:03:70:81:d8:4e:77:fd:8f:b6:
                    6a:ac:91:ba:f5:06:d0:01:2f:96:0d:cd:e1:d7:98:9f:
                    04:fb:d4:40:76:41:7c:54:a5:32:a7:42:60:7e:e9:86:
                    6f:0d:b1:a9:a8:b4:51:66:cf:0d:b4:3b:5b:8b:62:75
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Critical: True
            Usages: Digital Signature
                    Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:f6:00:5f:08:34:3c:b5:6e:5b:b8:9a:de:b3:40:40:
        af:48:0f:bc:ac:0d:74:87:c5:dc:13:cb:2f:4c:fd:1b:
        0e:96:84:42:96:3b:f9:18:96:5e:38:5c:a3:6f:56:e3:
        59:f8:62:e8:bb:fe:51:5d:98:7d:c4:00:ad:66:9f:69:
        30:92:73:d0:35:3b:d4:6e:6d:5a:80:88:de:bb:ad:db:
        4f:70:5a:ca:f8:d5:ac:0e:6a:c7:ce:90:cb:18:2f:7c:
        a6:4f:1a:93:cd:ab:04:d0:95:e2:f5:b5:5f:35:9f:78:
        7d:3f:1e:f3:6f:f6:82:3a:83:92:cb:86:90:9a:10:2e
    Fingerprint (MD5):
        36:12:5C:FC:5D:7F:BC:BC:27:08:C8:23:59:E6:AE:3E
    Fingerprint (SHA1):
        95:5C:7F:15:7E:CB:72:C5:C2:77:DA:B5:01:E0:19:00:77:C8:03:FA

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #451: Certificate Key Usage Extension (2) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt3 -t u,u,u -o /tmp/cert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
y
-1
n


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt3
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:59:31
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Tue Nov 27 23:55:41 2012
            Not After : Wed Feb 27 23:55:41 2013
        Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:68:d9:f6:45:14:49:07:d0:46:ca:1e:8c:db:7b:3a:
                    32:34:ee:6a:21:e4:08:61:1d:3a:9e:ec:2f:fe:a0:cb:
                    e4:bf:d7:d7:1b:ce:d7:42:f5:a3:86:79:4c:e2:00:1d:
                    83:ed:28:6b:f3:00:43:c3:1e:5a:b0:fd:68:27:b8:f0:
                    fb:5d:d5:c8:fb:95:72:ef:d3:ba:60:c3:11:4b:4d:a7:
                    0f:06:e1:cb:39:de:af:7b:02:49:c9:32:67:6e:71:ef:
                    ad:cc:64:b6:c9:35:e2:f2:96:34:b7:dc:91:13:5b:0d:
                    89:de:0c:2b:73:ee:db:eb:e3:61:1e:d2:d6:af:6d:0d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        22:90:b2:8a:1f:f6:7e:0d:56:db:e0:e2:b7:2d:29:40:
        6a:12:3a:2d:22:65:79:25:9a:91:0a:41:5b:e9:8d:8d:
        ec:c0:ef:00:59:89:b0:84:ea:31:c6:2a:b9:84:52:31:
        7a:3e:cc:c1:0e:f9:aa:c7:7d:d0:ea:ad:e1:49:38:a6:
        34:8c:73:89:d8:f3:36:73:f8:d2:47:36:86:12:e1:33:
        49:19:a6:11:39:50:d9:f5:13:63:bf:c0:10:0a:e0:5f:
        11:20:26:2b:cc:44:45:98:29:63:f0:d5:5b:f6:21:c8:
        d4:40:14:06:9a:ec:d5:f5:a4:7c:a8:fb:17:4c:ee:b9
    Fingerprint (MD5):
        0C:05:77:A1:81:CB:D7:73:34:7D:D2:A7:78:87:84:FE
    Fingerprint (SHA1):
        B0:69:B0:8D:4C:B8:FE:33:18:41:FC:BE:25:79:4F:1D:4C:87:05:E2

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #452: Certificate Basic Constraints Extension (3) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt4 -t u,u,u -o /tmp/cert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
n
-1
y


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt4
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:59:31
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Tue Nov 27 23:55:41 2012
            Not After : Wed Feb 27 23:55:41 2013
        Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:8a:ee:a9:ca:47:55:63:1e:4d:2f:9a:e3:e4:c5:b6:
                    35:af:7f:e0:c6:e3:90:16:ea:6a:cc:a8:bc:1f:04:28:
                    c6:68:88:d7:6e:8f:05:20:c1:a7:65:0e:6a:be:8e:df:
                    bb:41:1b:ac:12:b6:9f:a0:2e:ad:9b:dc:27:cd:22:46:
                    cc:d1:1e:90:9a:d9:fc:21:05:86:73:fe:1f:39:76:d1:
                    85:12:a6:8e:50:70:cc:62:66:6e:c0:8b:9a:a0:ce:45:
                    34:c8:f7:bb:cf:70:f1:f6:98:2a:f9:96:37:07:07:5a:
                    e8:56:65:dd:82:4f:89:0d:ec:14:97:ca:ef:b9:01:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is not a CA.

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        45:aa:a7:92:4f:fb:10:62:ad:1b:27:5b:47:2e:4d:ff:
        95:c7:5a:7f:6d:60:68:51:bb:ac:d8:b1:61:86:30:7f:
        f2:18:b0:5d:e9:d8:51:12:e2:b9:f2:b8:43:41:e4:35:
        35:1d:76:90:96:6f:4e:55:0c:64:6a:07:ad:03:a4:33:
        03:fc:c0:3b:a4:9e:7a:2b:12:4f:db:6f:cc:30:1a:4d:
        59:5a:26:3e:4c:4d:96:39:24:97:96:69:e8:ad:7f:fa:
        0f:83:61:d7:f2:be:2b:a9:f3:93:9f:27:72:1a:14:6e:
        ee:c3:f3:6e:be:03:90:90:8b:7f:7d:fe:37:a0:a0:1b
    Fingerprint (MD5):
        22:E5:0B:B1:20:E4:96:9B:D6:CE:DC:73:0B:5E:8D:5E
    Fingerprint (SHA1):
        C0:F7:E0:6D:AB:A0:95:30:B5:1A:EB:95:A9:97:78:06:59:08:4C:27

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #453: Certificate Basic Constraints Extension (4) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt5 -t u,u,u -o /tmp/cert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
y
12341235123


y


Generating key.  This may take a few moments...

Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt5
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:59:32
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Tue Nov 27 23:55:41 2012
            Not After : Wed Feb 27 23:55:41 2013
        Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:3c:9e:f6:4d:e0:3f:78:55:67:34:91:09:04:ba:a2:
                    86:4e:21:19:dc:43:42:df:23:30:c7:c7:b7:f6:05:e8:
                    16:6a:80:70:e8:c3:b1:c8:5c:82:e1:08:7f:30:c6:d8:
                    5c:b9:dc:90:c1:df:24:cd:23:09:6d:0c:31:ed:ca:9e:
                    5a:94:f1:28:fe:38:21:ec:6a:14:a8:36:34:63:d8:b5:
                    95:f8:bf:fa:e5:16:c9:3e:11:d6:07:1d:da:ad:ad:13:
                    2a:59:e2:1a:cf:93:0a:ec:f3:66:6b:53:9d:e2:ca:fb:
                    70:bb:aa:2f:02:c3:f5:95:be:87:28:30:75:d8:69:0f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Critical: True
            Key ID:
                12341235123

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        32:c8:23:a8:cd:25:d8:92:e1:d2:3d:38:b2:9e:e0:81:
        5c:b8:00:98:c0:3e:d8:fa:4a:ad:0a:6c:5c:f5:3f:ad:
        60:bf:34:d3:21:72:b4:24:9d:3c:f0:a1:9d:2c:91:a0:
        a2:e9:e1:48:d3:86:53:d3:23:48:a8:1b:8a:dc:a5:b9:
        fc:7f:13:c5:6e:90:87:f3:b4:1f:30:ed:28:f7:af:0e:
        9d:96:64:8d:23:4d:c8:79:f3:33:38:77:f7:0e:4b:c9:
        e3:34:e2:bd:d1:d5:82:26:a0:6d:79:06:e0:5c:e4:d0:
        6b:89:fa:b9:04:49:76:be:e6:f2:f8:92:fc:6d:ea:4a
    Fingerprint (MD5):
        A5:98:F9:9D:7D:88:C0:9F:18:36:38:5E:AB:7D:5B:AE
    Fingerprint (SHA1):
        4C:50:A8:8A:28:B9:C3:9B:91:64:53:95:6B:63:7D:ED:87:DF:B6:E6

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #454: Certificate Authority Key Identifier Extension (5) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt6 -t u,u,u -o /tmp/cert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
y

3
test.com

214123
y


Generating key.  This may take a few moments...

Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt6
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:59:33
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Tue Nov 27 23:55:41 2012
            Not After : Wed Feb 27 23:55:41 2013
        Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:08:d8:67:18:7a:4b:b0:c4:ff:ad:2c:dc:90:1e:cc:
                    27:16:54:a1:17:d4:47:40:4e:f0:73:d6:4a:58:09:45:
                    5c:f3:25:2d:ea:61:bf:bb:26:5a:bf:2c:7f:52:4a:fc:
                    ca:0c:74:12:87:30:43:d2:f4:dc:07:ac:7b:39:e7:f7:
                    64:9e:74:1e:93:b0:50:99:9d:7b:0a:07:80:26:76:d0:
                    5f:3a:fc:e9:e6:08:85:bb:0d:dd:ce:25:b4:69:2a:c8:
                    27:91:ab:2f:75:c0:09:dd:2d:55:04:52:60:7c:88:d0:
                    dd:33:5e:c2:e4:0a:95:d3:aa:d8:68:09:33:16:21:5f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Critical: True
            Issuer: 
                DNS name: "test.com"
            Serial Number:
                214123

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        d8:89:f8:4a:30:48:2e:04:ca:60:d6:9a:6e:37:64:15:
        89:44:c9:9b:e7:85:ae:b1:e4:c5:c7:08:c0:d7:3d:a0:
        24:2a:cc:82:06:70:d1:27:b4:2d:47:37:70:b1:0e:62:
        85:aa:c2:ce:e9:90:1a:0f:59:d8:bf:c9:23:0e:10:84:
        ed:89:5a:68:de:16:1c:00:33:2d:9e:b6:88:cc:70:9a:
        d5:34:e1:4b:a9:7a:15:95:d1:cf:44:ba:60:b5:d9:d1:
        5c:e4:e0:23:92:36:11:40:7a:1a:00:91:8e:94:77:37:
        ae:19:ef:35:18:ed:98:73:9a:f7:09:cd:a8:c4:03:1c
    Fingerprint (MD5):
        20:28:79:DE:71:9C:F4:29:AA:29:A3:13:EB:C2:4F:C8
    Fingerprint (SHA1):
        F5:04:0E:96:8D:09:FF:8C:AB:47:38:E8:33:77:C9:5C:DA:49:FE:4E

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #455: Certificate Authority Key Identifier Extension (6) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt7 -t u,u,u -o /tmp/cert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
1
2
rfc822@name.tld
3
test.com
8
1.2.3.4
9
OID.0.2.213
10
0
10
n
n


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt7
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:59:33
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Tue Nov 27 23:55:42 2012
            Not After : Wed Feb 27 23:55:42 2013
        Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ae:0a:ed:e2:7f:4d:3b:52:ed:3d:95:40:13:c7:11:d6:
                    67:3e:f3:08:1d:f0:20:37:5c:77:ea:12:c5:80:bf:d4:
                    73:73:e7:14:d2:db:ac:04:49:db:06:72:18:1d:1e:e3:
                    65:52:09:9d:8b:af:b6:38:5f:58:cb:f2:c2:99:fc:36:
                    19:bb:6c:a6:15:e1:dd:c3:75:f0:11:a9:b7:9a:98:dd:
                    1e:ec:fd:02:01:43:3a:df:33:7a:8d:9a:63:7b:1a:2c:
                    20:a3:96:5c:67:e5:16:85:f7:62:5b:df:93:d8:0b:52:
                    bd:d7:a7:ae:04:14:ce:a5:a5:28:c8:ad:64:c5:f8:ad
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: CRL Distribution Points
            Distribution point:
                RFC822 Name: "rfc822@name.tld"
                DNS name: "test.com"
                IP Address:
                    87:07:31:2e:32:2e:33:2e:34
                Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51
                Reasons:
                    80
                    (7 least significant bits unused)

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        2d:db:c3:3f:1c:be:bc:72:96:26:33:b3:3f:cb:bc:a9:
        54:9b:a1:b2:5d:c0:06:0d:74:06:af:f7:60:ef:02:f2:
        85:b4:3c:23:ba:e2:3f:be:00:67:ae:f3:4e:21:61:e8:
        4c:5e:a2:9f:88:24:d8:e4:93:90:7e:29:f8:31:f4:c7:
        7a:8d:13:3c:59:51:36:48:84:94:ed:ca:b6:81:c3:bb:
        a4:42:4e:b0:9a:5e:88:1b:6f:1a:1e:ae:c9:d8:dd:f4:
        50:cb:38:c1:b6:3f:cd:d8:a6:59:b8:51:f1:9b:8a:ab:
        91:a4:6e:6c:2c:5c:4e:4d:d4:66:62:3e:51:e4:1e:f8
    Fingerprint (MD5):
        B2:AC:AD:D3:D1:7D:EC:06:D5:87:2A:27:71:85:9B:A4
    Fingerprint (SHA1):
        9C:B5:BF:80:E4:14:5E:D0:F8:E4:7C:CB:D8:24:DB:C2:CE:B4:E4:6C

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #456: CRL Distribution Points Extension (7) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt8 -t u,u,u -o /tmp/cert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
2
SN=asdfsdf
4
3
test.com
10
n
n


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > Enter the relative name: 

Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt8
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:59:34
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Tue Nov 27 23:55:42 2012
            Not After : Wed Feb 27 23:55:42 2013
        Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:83:ba:d3:0c:f6:ad:28:d5:4c:a5:70:29:9d:1c:4d:
                    0c:1c:15:18:80:ea:0f:42:b0:29:42:73:a2:05:37:e9:
                    d1:bc:ff:74:3f:5c:4f:98:25:18:c1:4c:e1:30:71:e4:
                    bc:90:2c:3d:6e:ca:63:b3:f9:d2:d8:2d:be:a2:72:dd:
                    4e:66:15:21:bc:b1:c7:c1:3a:94:4d:c0:c7:f6:23:4b:
                    43:e4:97:5a:8f:d2:a5:47:b5:32:b6:58:3b:60:c8:09:
                    b3:da:19:3b:98:38:7b:43:b7:49:18:b0:c4:35:4d:b8:
                    dd:e6:7c:f7:99:3f:1e:8c:89:bb:14:29:4d:27:8d:93
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: CRL Distribution Points
            Distribution point:
                RDN: "SN=asdfsdf"
                Reasons:
                    08
                    (7 least significant bits unused)
                CRL issuer: 
                    DNS name: "test.com"

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        2c:93:1b:77:3c:9b:ae:58:70:61:50:10:1e:be:69:66:
        82:2f:1a:64:8f:f6:b4:ee:d4:28:6b:84:51:45:4f:00:
        c3:3a:f2:29:5b:7d:e3:5d:dc:f3:40:2e:11:b2:a1:cd:
        c7:29:bf:aa:8c:18:c1:73:f0:ed:1a:14:9e:0f:a1:b8:
        22:4a:04:0f:2a:41:e7:1b:76:13:12:f8:16:d4:30:4b:
        b4:2f:59:3f:09:21:10:35:4d:78:be:42:a4:ea:e6:fd:
        12:9a:8b:2f:27:7f:ac:78:fa:86:5e:85:81:6b:1f:70:
        7c:97:e3:fb:df:c0:20:f7:c1:c8:06:bb:22:35:7b:06
    Fingerprint (MD5):
        3E:B3:8E:F1:98:F4:12:51:4D:2A:CF:9C:B7:83:C3:B9
    Fingerprint (SHA1):
        32:50:0D:DA:2D:CB:9D:B1:58:B0:D0:AA:89:07:C6:3F:CC:7C:1D:6C

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #457: CRL Distribution Points Extension (8) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt9 -t u,u,u -o /tmp/cert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
0
1
2
10
n


Generating key.  This may take a few moments...

0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt9
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:59:34
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Tue Nov 27 23:55:42 2012
            Not After : Wed Feb 27 23:55:42 2013
        Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d7:12:a4:f1:b9:60:e5:3b:2f:14:66:e3:37:df:10:22:
                    f6:88:e5:cd:29:8c:98:5e:4c:38:31:08:9b:8b:08:ba:
                    33:95:4d:b5:88:53:1d:a5:c0:c8:ab:41:1d:ad:20:db:
                    97:43:ca:09:ab:d1:8d:77:88:5c:db:04:67:90:c5:41:
                    d5:a2:f7:d1:01:d9:ef:f7:25:30:06:85:7d:41:a5:73:
                    eb:00:1a:40:11:2f:d3:2d:15:1a:ea:bd:ee:0d:fa:e6:
                    4d:58:89:b9:57:4d:55:94:eb:e2:09:66:27:5b:33:6b:
                    61:21:2e:18:cc:c8:02:98:3e:d9:8f:33:a4:09:59:11
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL Client,SSL Server,S/MIME>

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:18:c1:84:ca:ba:24:f1:d7:5f:b6:f6:f3:2d:ba:4c:
        19:3b:18:17:50:2b:62:cc:01:c2:81:e1:1c:4a:7d:6f:
        94:e8:5f:ca:a4:0f:6b:dc:62:10:45:5e:58:2a:84:95:
        07:8e:a6:d7:dd:8d:19:e4:67:ae:82:bd:b3:9b:42:00:
        57:29:fc:8d:6a:16:9c:d4:12:a8:90:2e:de:f0:b0:72:
        00:87:c7:8a:6e:a3:c5:33:27:e8:d0:d2:d7:83:05:5e:
        d0:cc:50:ae:7f:b9:ec:04:85:91:f3:85:0c:59:4b:b6:
        93:94:c5:43:54:e8:df:b4:35:8b:46:ea:e5:37:32:bd
    Fingerprint (MD5):
        AF:C5:6F:B0:D1:25:22:50:E0:63:2D:53:D5:36:27:C1
    Fingerprint (SHA1):
        32:A5:E4:49:A7:CE:3C:6F:98:1F:0F:CE:A9:BD:40:32:E3:CD:25:AF

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #458: Certificate Type Extension (9) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt10 -t u,u,u -o /tmp/cert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y


Generating key.  This may take a few moments...

0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt10
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:59:35
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi
            ew,ST=California,C=US"
        Validity:
            Not Before: Tue Nov 27 23:55:43 2012
            Not After : Wed Feb 27 23:55:43 2013
        Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V
            iew,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cb:60:b4:d2:7a:f1:45:6e:db:1e:37:b8:ae:88:47:28:
                    1f:9a:a5:53:8b:e0:d6:a4:f6:2c:d6:54:2e:05:d9:a2:
                    19:29:0c:a8:44:16:85:98:43:0e:1f:a4:19:67:1b:19:
                    6f:de:72:46:1d:6c:89:bf:04:5f:bc:ea:d4:cc:50:6a:
                    fd:b3:b5:37:d9:11:81:72:19:f7:69:85:cc:66:f7:8e:
                    59:9c:c9:d5:99:f5:b2:c2:dc:08:14:f0:cf:d1:db:ad:
                    1b:30:56:5c:40:13:86:8f:fd:f5:dc:67:46:0a:d3:cc:
                    f3:be:6b:f1:b1:a6:a9:d1:e2:a9:af:3b:65:b5:28:b9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Extended Key Usage
            Critical: True
                TLS Web Server Authentication Certificate
                TLS Web Client Authentication Certificate
                Code Signing Certificate
                E-Mail Protection Certificate
                Time Stamping Certifcate
                OCSP Responder Certificate
                Strong Crypto Export Approved

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8c:3b:7d:48:49:a4:7a:88:90:d7:a0:c5:27:91:b9:ee:
        91:be:4b:0b:da:96:0a:cd:20:b3:cc:fe:79:85:d7:af:
        77:68:8c:93:81:a5:2f:37:d1:20:50:d7:72:79:f5:05:
        1e:64:35:d2:27:b7:ab:8d:5d:91:43:c2:6a:5e:c5:ac:
        36:92:54:f8:3d:a5:fe:87:e6:55:8d:0e:7d:42:88:ab:
        62:99:6b:94:70:53:40:58:b8:47:10:9c:dd:78:c3:96:
        bc:7d:ec:ae:09:b7:5b:c0:7d:fe:ce:54:ce:18:56:b4:
        8b:c9:10:6d:ee:03:de:1c:a3:56:3e:78:8e:3b:0b:02
    Fingerprint (MD5):
        82:A1:AD:CC:F9:31:F7:8B:AB:B3:20:7C:2D:D8:DC:08
    Fingerprint (SHA1):
        6A:7F:55:6C:53:80:98:15:F6:8A:95:53:2F:5A:5B:16:77:1C:28:B4

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #459: Extended Key Usage Extension (10) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -S -n TestExt11 -t u,u,u -o /tmp/cert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions/test.args
certutil options:

1
2
3
4
5
6
10
n


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert_extensions -L -n TestExt11
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:59:36
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi
            ew,ST=California,C=US"
        Validity:
            Not Before: Tue Nov 27 23:55:43 2012
            Not After : Wed Feb 27 23:55:43 2013
        Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V
            iew,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    af:5d:ec:6b:b3:97:b4:03:d3:c1:a1:57:f5:b8:b8:42:
                    06:4b:62:bf:d6:ae:cb:13:10:bd:47:e8:a3:bc:0c:42:
                    81:15:24:17:f7:5f:39:a8:c7:97:4e:67:7c:df:ac:ab:
                    85:92:c9:c6:5a:de:91:3d:54:4c:e5:11:28:0c:28:70:
                    a3:20:39:ca:f3:d9:a7:72:d8:32:79:6e:13:fb:46:0e:
                    3a:a1:6c:d7:21:c1:99:ed:ce:cd:80:bd:43:ef:f1:4c:
                    52:56:be:cf:9e:c9:c9:1a:b2:b2:6f:4b:b1:24:12:b8:
                    b8:f5:49:f3:e3:bc:7f:77:cf:d1:45:e0:d1:65:13:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Usages: Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:a9:c8:96:1f:72:71:46:40:f1:bd:11:7b:d3:a2:32:
        56:33:f3:50:d8:12:af:c7:1c:67:01:5f:4f:aa:3b:10:
        b5:97:4b:a6:8d:59:37:a2:aa:c5:6b:4a:84:04:e5:32:
        44:eb:71:ad:f2:0d:9a:0a:7a:53:04:86:67:9f:d6:05:
        e6:e0:56:24:d2:96:a6:b6:0b:93:66:a5:6f:95:70:8e:
        b7:4e:70:b9:5a:29:e5:df:dd:d4:a1:90:eb:45:1e:12:
        00:89:41:45:3d:c1:de:8a:20:da:6d:29:a2:45:ee:54:
        a9:b0:22:54:7b:c7:fc:0d:36:22:9a:e2:b3:b0:7f:4e
    Fingerprint (MD5):
        4A:3C:9B:6D:2D:6C:38:F7:67:1E:AD:A6:A9:AA:75:03
    Fingerprint (SHA1):
        83:A4:DA:38:5D:BB:6D:EA:D3:EC:09:9D:75:F4:20:7B:B9:2B:FA:A0

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #460: Certificate Key Usage Extension (11) - PASSED
cert.sh: Create A Password Test Cert  ==============
cert.sh: Create A Password Test Ca  --------
cert.sh: Creating a CA Certificate PasswordCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dbpass
cert.sh: Creating CA Cert DB --------------------------
certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dbpass -f ../tests.pw
cert.sh: #461: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dbpass

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #462: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert PasswordCA  --------------------------
certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #463: Creating CA Cert PasswordCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n PasswordCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dbpass -o root.cert
cert.sh: #464: Exporting Root Cert - PASSED
cert.sh: Changing password on Password Test Cert's Cert DB --------------------------
certutil -W -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dbpass -f ../tests.pw -@ ../tests.fipspw
Password changed successfully.
cert.sh: #465: Changing password on Password Test Cert's Cert DB - PASSED
cert.sh: Generate Certificate for Password Test Cert with new password --------------------------
certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dbpass -f ../tests.fipspw -z ../tests_noise


Generating key.  This may take a few moments...

cert.sh: #466: Generate Certificate for Password Test Cert with new password - PASSED
cert.sh SUCCESS: PASSWORD passed
cert.sh: Verify Certificate for Password Test Cert with new password --------------------------
certutil -V -n PasswordCert -u S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/dbpass -f ../tests.fipspw
certutil: certificate is valid
cert.sh: #467: Verify Certificate for Password Test Cert with new password - PASSED
cert.sh: Creating Distrusted Certificate
cert.sh: Initializing Distrusted's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
cert.sh: #468: Initializing Distrusted's Cert DB - PASSED
cert.sh: Loading root cert module to Distrusted's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #469: Loading root cert module to Distrusted's Cert DB - PASSED
cert.sh: Import Root CA for Distrusted --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -i ../CA/TestCA.ca.cert
cert.sh: #470: Import Root CA for Distrusted - PASSED
cert.sh: Import EC Root CA for Distrusted --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -i ../CA/TestCA-ec.ca.cert
cert.sh: #471: Import EC Root CA for Distrusted - PASSED
cert.sh: Generate Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #472: Generate Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's Request --------------------------
certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw 
cert.sh: #473: Sign Distrusted's Request - PASSED
cert.sh: Import Distrusted's Cert --------------------------
certutil -A -n Distrusted -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw -i Distrusted.cert
cert.sh: #474: Import Distrusted's Cert - PASSED
cert.sh SUCCESS: Distrusted's Cert Created
cert.sh: Generate EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #475: Generate EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request --------------------------
certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw 
cert.sh: #476: Sign Distrusted's EC Request - PASSED
cert.sh: Import Distrusted's EC Cert --------------------------
certutil -A -n Distrusted-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw -i Distrusted-ec.cert
cert.sh: #477: Import Distrusted's EC Cert - PASSED
cert.sh SUCCESS: Distrusted's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #478: Generate mixed EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request with RSA --------------------------
certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw 
cert.sh: #479: Sign Distrusted's EC Request with RSA - PASSED
cert.sh: Import Distrusted's mixed EC Cert --------------------------
certutil -A -n Distrusted-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw -i Distrusted-ecmixed.cert
cert.sh: #480: Import Distrusted's mixed EC Cert - PASSED
cert.sh SUCCESS: Distrusted's mixed EC Cert Created
cert.sh: Mark CERT as unstrusted --------------------------
certutil -M -n Distrusted -t p,p,p -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
cert.sh: #481: Mark CERT as unstrusted - PASSED
cert.sh: Creating Distrusted Intermediate
cert.sh: Creating a CA Certificate DistrustedCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA
cert.sh: Creating CA Cert DistrustedCA  --------------------------
certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #482: Creating CA Cert DistrustedCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n DistrustedCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -o root.cert
cert.sh: #483: Exporting Root Cert - PASSED
cert.sh: Import Distrusted Intermediate --------------------------
certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -i ../CA/DistrustedCA.ca.cert
cert.sh: #484: Import Distrusted Intermediate - PASSED
cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA --------------------------
certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #485: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED
cp: `./req' and `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA/req' are the same file
cert.sh: Sign LeafChainedToDistrustedCA's Request --------------------------
certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw
cert.sh: #486: Sign LeafChainedToDistrustedCA's Request - PASSED
cert.sh: Import LeafChainedToDistrustedCA's Cert  -t u,u,u --------------------------
certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert
cert.sh: #487: Import LeafChainedToDistrustedCA's Cert  -t u,u,u - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server --------------------------
certutil -V -n LeafChainedToDistrustedCA -u V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #488: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client --------------------------
certutil -V -n LeafChainedToDistrustedCA -u C -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #489: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #490: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient --------------------------
certutil -V -n LeafChainedToDistrustedCA -u R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #491: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder --------------------------
certutil -V -n LeafChainedToDistrustedCA -u O -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #492: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u J -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #493: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED
cert.sh: Verify Distrusted Cert for SSL Server --------------------------
certutil -V -n Distrusted -u V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #494: Verify Distrusted Cert for SSL Server - PASSED
cert.sh: Verify Distrusted Cert for SSL Client --------------------------
certutil -V -n Distrusted -u C -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #495: Verify Distrusted Cert for SSL Client - PASSED
cert.sh: Verify Distrusted Cert for Email signer --------------------------
certutil -V -n Distrusted -u S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #496: Verify Distrusted Cert for Email signer - PASSED
cert.sh: Verify Distrusted Cert for Email recipient --------------------------
certutil -V -n Distrusted -u R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #497: Verify Distrusted Cert for Email recipient - PASSED
cert.sh: Verify Distrusted Cert for OCSP responder --------------------------
certutil -V -n Distrusted -u O -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #498: Verify Distrusted Cert for OCSP responder - PASSED
cert.sh: Verify Distrusted Cert for Object Signer --------------------------
certutil -V -n Distrusted -u J -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #499: Verify Distrusted Cert for Object Signer - PASSED
cert.sh: OCSP response creation selftest
cert.sh: perform selftest --------------------------
ocspresp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/serverCA serverCA chain-1-serverCA -f ../tests.pw
cert.sh: #500: perform selftest - PASSED
cert.sh: Creating Client CA Issued Certificates Range 40 - 52 ===
cert.sh: Generate Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #501: Generate Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw 
cert.sh: #502: Sign TestUser40's Request - PASSED
cert.sh: Import TestUser40's Cert --------------------------
certutil -A -n TestUser40 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser40.cert
cert.sh: #503: Import TestUser40's Cert - PASSED
cert.sh SUCCESS: TestUser40's Cert Created
cert.sh: Generate EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #504: Generate EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw 
cert.sh: #505: Sign TestUser40's EC Request - PASSED
cert.sh: Import TestUser40's EC Cert --------------------------
certutil -A -n TestUser40-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser40-ec.cert
cert.sh: #506: Import TestUser40's EC Cert - PASSED
cert.sh SUCCESS: TestUser40's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #507: Generate mixed EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw 
cert.sh: #508: Sign TestUser40's EC Request with RSA - PASSED
cert.sh: Import TestUser40's mixed EC Cert --------------------------
certutil -A -n TestUser40-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser40-ecmixed.cert
cert.sh: #509: Import TestUser40's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser40's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #510: Generate Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's Request --------------------------
certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw 
cert.sh: #511: Sign TestUser41's Request - PASSED
cert.sh: Import TestUser41's Cert --------------------------
certutil -A -n TestUser41 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser41.cert
cert.sh: #512: Import TestUser41's Cert - PASSED
cert.sh SUCCESS: TestUser41's Cert Created
cert.sh: Generate EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #513: Generate EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request --------------------------
certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw 
cert.sh: #514: Sign TestUser41's EC Request - PASSED
cert.sh: Import TestUser41's EC Cert --------------------------
certutil -A -n TestUser41-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser41-ec.cert
cert.sh: #515: Import TestUser41's EC Cert - PASSED
cert.sh SUCCESS: TestUser41's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #516: Generate mixed EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw 
cert.sh: #517: Sign TestUser41's EC Request with RSA - PASSED
cert.sh: Import TestUser41's mixed EC Cert --------------------------
certutil -A -n TestUser41-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser41-ecmixed.cert
cert.sh: #518: Import TestUser41's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser41's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #519: Generate Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's Request --------------------------
certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw 
cert.sh: #520: Sign TestUser42's Request - PASSED
cert.sh: Import TestUser42's Cert --------------------------
certutil -A -n TestUser42 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser42.cert
cert.sh: #521: Import TestUser42's Cert - PASSED
cert.sh SUCCESS: TestUser42's Cert Created
cert.sh: Generate EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #522: Generate EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request --------------------------
certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw 
cert.sh: #523: Sign TestUser42's EC Request - PASSED
cert.sh: Import TestUser42's EC Cert --------------------------
certutil -A -n TestUser42-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser42-ec.cert
cert.sh: #524: Import TestUser42's EC Cert - PASSED
cert.sh SUCCESS: TestUser42's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #525: Generate mixed EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw 
cert.sh: #526: Sign TestUser42's EC Request with RSA - PASSED
cert.sh: Import TestUser42's mixed EC Cert --------------------------
certutil -A -n TestUser42-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser42-ecmixed.cert
cert.sh: #527: Import TestUser42's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser42's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #528: Generate Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's Request --------------------------
certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw 
cert.sh: #529: Sign TestUser43's Request - PASSED
cert.sh: Import TestUser43's Cert --------------------------
certutil -A -n TestUser43 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser43.cert
cert.sh: #530: Import TestUser43's Cert - PASSED
cert.sh SUCCESS: TestUser43's Cert Created
cert.sh: Generate EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #531: Generate EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request --------------------------
certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw 
cert.sh: #532: Sign TestUser43's EC Request - PASSED
cert.sh: Import TestUser43's EC Cert --------------------------
certutil -A -n TestUser43-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser43-ec.cert
cert.sh: #533: Import TestUser43's EC Cert - PASSED
cert.sh SUCCESS: TestUser43's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #534: Generate mixed EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw 
cert.sh: #535: Sign TestUser43's EC Request with RSA - PASSED
cert.sh: Import TestUser43's mixed EC Cert --------------------------
certutil -A -n TestUser43-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser43-ecmixed.cert
cert.sh: #536: Import TestUser43's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser43's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #537: Generate Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's Request --------------------------
certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw 
cert.sh: #538: Sign TestUser44's Request - PASSED
cert.sh: Import TestUser44's Cert --------------------------
certutil -A -n TestUser44 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser44.cert
cert.sh: #539: Import TestUser44's Cert - PASSED
cert.sh SUCCESS: TestUser44's Cert Created
cert.sh: Generate EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #540: Generate EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request --------------------------
certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw 
cert.sh: #541: Sign TestUser44's EC Request - PASSED
cert.sh: Import TestUser44's EC Cert --------------------------
certutil -A -n TestUser44-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser44-ec.cert
cert.sh: #542: Import TestUser44's EC Cert - PASSED
cert.sh SUCCESS: TestUser44's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #543: Generate mixed EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw 
cert.sh: #544: Sign TestUser44's EC Request with RSA - PASSED
cert.sh: Import TestUser44's mixed EC Cert --------------------------
certutil -A -n TestUser44-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser44-ecmixed.cert
cert.sh: #545: Import TestUser44's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser44's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #546: Generate Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's Request --------------------------
certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw 
cert.sh: #547: Sign TestUser45's Request - PASSED
cert.sh: Import TestUser45's Cert --------------------------
certutil -A -n TestUser45 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser45.cert
cert.sh: #548: Import TestUser45's Cert - PASSED
cert.sh SUCCESS: TestUser45's Cert Created
cert.sh: Generate EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #549: Generate EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request --------------------------
certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw 
cert.sh: #550: Sign TestUser45's EC Request - PASSED
cert.sh: Import TestUser45's EC Cert --------------------------
certutil -A -n TestUser45-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser45-ec.cert
cert.sh: #551: Import TestUser45's EC Cert - PASSED
cert.sh SUCCESS: TestUser45's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #552: Generate mixed EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw 
cert.sh: #553: Sign TestUser45's EC Request with RSA - PASSED
cert.sh: Import TestUser45's mixed EC Cert --------------------------
certutil -A -n TestUser45-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser45-ecmixed.cert
cert.sh: #554: Import TestUser45's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser45's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #555: Generate Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's Request --------------------------
certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw 
cert.sh: #556: Sign TestUser46's Request - PASSED
cert.sh: Import TestUser46's Cert --------------------------
certutil -A -n TestUser46 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser46.cert
cert.sh: #557: Import TestUser46's Cert - PASSED
cert.sh SUCCESS: TestUser46's Cert Created
cert.sh: Generate EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #558: Generate EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request --------------------------
certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw 
cert.sh: #559: Sign TestUser46's EC Request - PASSED
cert.sh: Import TestUser46's EC Cert --------------------------
certutil -A -n TestUser46-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser46-ec.cert
cert.sh: #560: Import TestUser46's EC Cert - PASSED
cert.sh SUCCESS: TestUser46's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #561: Generate mixed EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw 
cert.sh: #562: Sign TestUser46's EC Request with RSA - PASSED
cert.sh: Import TestUser46's mixed EC Cert --------------------------
certutil -A -n TestUser46-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser46-ecmixed.cert
cert.sh: #563: Import TestUser46's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser46's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #564: Generate Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's Request --------------------------
certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw 
cert.sh: #565: Sign TestUser47's Request - PASSED
cert.sh: Import TestUser47's Cert --------------------------
certutil -A -n TestUser47 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser47.cert
cert.sh: #566: Import TestUser47's Cert - PASSED
cert.sh SUCCESS: TestUser47's Cert Created
cert.sh: Generate EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #567: Generate EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request --------------------------
certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw 
cert.sh: #568: Sign TestUser47's EC Request - PASSED
cert.sh: Import TestUser47's EC Cert --------------------------
certutil -A -n TestUser47-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser47-ec.cert
cert.sh: #569: Import TestUser47's EC Cert - PASSED
cert.sh SUCCESS: TestUser47's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #570: Generate mixed EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw 
cert.sh: #571: Sign TestUser47's EC Request with RSA - PASSED
cert.sh: Import TestUser47's mixed EC Cert --------------------------
certutil -A -n TestUser47-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser47-ecmixed.cert
cert.sh: #572: Import TestUser47's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser47's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #573: Generate Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's Request --------------------------
certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw 
cert.sh: #574: Sign TestUser48's Request - PASSED
cert.sh: Import TestUser48's Cert --------------------------
certutil -A -n TestUser48 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser48.cert
cert.sh: #575: Import TestUser48's Cert - PASSED
cert.sh SUCCESS: TestUser48's Cert Created
cert.sh: Generate EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #576: Generate EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request --------------------------
certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw 
cert.sh: #577: Sign TestUser48's EC Request - PASSED
cert.sh: Import TestUser48's EC Cert --------------------------
certutil -A -n TestUser48-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser48-ec.cert
cert.sh: #578: Import TestUser48's EC Cert - PASSED
cert.sh SUCCESS: TestUser48's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #579: Generate mixed EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw 
cert.sh: #580: Sign TestUser48's EC Request with RSA - PASSED
cert.sh: Import TestUser48's mixed EC Cert --------------------------
certutil -A -n TestUser48-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser48-ecmixed.cert
cert.sh: #581: Import TestUser48's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser48's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #582: Generate Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's Request --------------------------
certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw 
cert.sh: #583: Sign TestUser49's Request - PASSED
cert.sh: Import TestUser49's Cert --------------------------
certutil -A -n TestUser49 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser49.cert
cert.sh: #584: Import TestUser49's Cert - PASSED
cert.sh SUCCESS: TestUser49's Cert Created
cert.sh: Generate EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #585: Generate EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request --------------------------
certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw 
cert.sh: #586: Sign TestUser49's EC Request - PASSED
cert.sh: Import TestUser49's EC Cert --------------------------
certutil -A -n TestUser49-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser49-ec.cert
cert.sh: #587: Import TestUser49's EC Cert - PASSED
cert.sh SUCCESS: TestUser49's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #588: Generate mixed EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw 
cert.sh: #589: Sign TestUser49's EC Request with RSA - PASSED
cert.sh: Import TestUser49's mixed EC Cert --------------------------
certutil -A -n TestUser49-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser49-ecmixed.cert
cert.sh: #590: Import TestUser49's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser49's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #591: Generate Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw 
cert.sh: #592: Sign TestUser50's Request - PASSED
cert.sh: Import TestUser50's Cert --------------------------
certutil -A -n TestUser50 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser50.cert
cert.sh: #593: Import TestUser50's Cert - PASSED
cert.sh SUCCESS: TestUser50's Cert Created
cert.sh: Generate EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #594: Generate EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw 
cert.sh: #595: Sign TestUser50's EC Request - PASSED
cert.sh: Import TestUser50's EC Cert --------------------------
certutil -A -n TestUser50-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser50-ec.cert
cert.sh: #596: Import TestUser50's EC Cert - PASSED
cert.sh SUCCESS: TestUser50's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #597: Generate mixed EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw 
cert.sh: #598: Sign TestUser50's EC Request with RSA - PASSED
cert.sh: Import TestUser50's mixed EC Cert --------------------------
certutil -A -n TestUser50-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser50-ecmixed.cert
cert.sh: #599: Import TestUser50's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser50's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #600: Generate Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's Request --------------------------
certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw 
cert.sh: #601: Sign TestUser51's Request - PASSED
cert.sh: Import TestUser51's Cert --------------------------
certutil -A -n TestUser51 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser51.cert
cert.sh: #602: Import TestUser51's Cert - PASSED
cert.sh SUCCESS: TestUser51's Cert Created
cert.sh: Generate EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #603: Generate EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request --------------------------
certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw 
cert.sh: #604: Sign TestUser51's EC Request - PASSED
cert.sh: Import TestUser51's EC Cert --------------------------
certutil -A -n TestUser51-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser51-ec.cert
cert.sh: #605: Import TestUser51's EC Cert - PASSED
cert.sh SUCCESS: TestUser51's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #606: Generate mixed EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw 
cert.sh: #607: Sign TestUser51's EC Request with RSA - PASSED
cert.sh: Import TestUser51's mixed EC Cert --------------------------
certutil -A -n TestUser51-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser51-ecmixed.cert
cert.sh: #608: Import TestUser51's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser51's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #609: Generate Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's Request --------------------------
certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw 
cert.sh: #610: Sign TestUser52's Request - PASSED
cert.sh: Import TestUser52's Cert --------------------------
certutil -A -n TestUser52 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser52.cert
cert.sh: #611: Import TestUser52's Cert - PASSED
cert.sh SUCCESS: TestUser52's Cert Created
cert.sh: Generate EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #612: Generate EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request --------------------------
certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw 
cert.sh: #613: Sign TestUser52's EC Request - PASSED
cert.sh: Import TestUser52's EC Cert --------------------------
certutil -A -n TestUser52-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser52-ec.cert
cert.sh: #614: Import TestUser52's EC Cert - PASSED
cert.sh SUCCESS: TestUser52's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #615: Generate mixed EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw 
cert.sh: #616: Sign TestUser52's EC Request with RSA - PASSED
cert.sh: Import TestUser52's mixed EC Cert --------------------------
certutil -A -n TestUser52-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -f ../tests.pw -i TestUser52-ecmixed.cert
cert.sh: #617: Import TestUser52's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser52's mixed EC Cert Created
cert.sh: Creating CA CRL =====================================
cert.sh: Generating CRL for range 40-42 TestCA authority --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or
cert.sh: #618: Generating CRL for range 40-42 TestCA authority - PASSED
cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority --------------------------
crlutil -q -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec
cert.sh: #619: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED
cert.sh: Modifying CA CRL by adding one more cert ============
cert.sh: Modify CRL by adding one more cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or
cert.sh: #620: Modify CRL by adding one more cert - PASSED
cert.sh: Modify CRL (ECC) by adding one more cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec
cert.sh: #621: Modify CRL (ECC) by adding one more cert - PASSED
cert.sh: Modifying CA CRL by removing one cert ===============
cert.sh: Modify CRL by removing one cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1
cert.sh: #622: Modify CRL by removing one cert - PASSED
cert.sh: Modify CRL (ECC) by removing one cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec
cert.sh: #623: Modify CRL (ECC) by removing one cert - PASSED
cert.sh: Creating CA CRL for groups 1 and 2  ===============
cert.sh: Creating CRL for groups 1 and 2 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42
cert.sh: #624: Creating CRL for groups 1 and 2 - PASSED
cert.sh: Creating CRL (ECC) for groups 1 and 2 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec
cert.sh: #625: Creating CRL (ECC) for groups 1 and 2 - PASSED
cert.sh: Creating CA CRL for groups 1, 2 and 3  ===============
cert.sh: Creating CRL for groups 1, 2 and 3 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48
cert.sh: #626: Creating CRL for groups 1, 2 and 3 - PASSED
cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec
cert.sh: #627: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED
cert.sh: Importing Server CA Issued CRL for certs  trough 52
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -D -n TestCA -f ../tests.pw -d ../server
crlutil: could not find TestCA's CRL: No matching CRL was found.
crlutil: could not find the issuer TestCA's CRL: No matching CRL was found.
cert.sh: #628: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server
cert.sh: #629: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server
crlutil: could not find TestCA-ec's CRL: No matching CRL was found.
crlutil: could not find the issuer TestCA-ec's CRL: No matching CRL was found.
cert.sh: #630: Importing CRL (ECC) for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server
cert.sh: #631: Importing CRL (ECC) for groups 1 - PASSED
cert.sh SUCCESS: SSL CRL prep passed
cert.sh cert.sh: finished cert.sh
TIMESTAMP cert END: Tue Nov 27 18:56:03 EST 2012
Running tests for dbtests
TIMESTAMP dbtests BEGIN: Tue Nov 27 18:56:03 EST 2012
dbtests.sh: CERT and Key DB Tests ===============================

---------------------------------------------------------------
| test opening the database read/write in a nonexisting directory
---------------------------------------------------------------
certutil: function failed: The certificate/key database is in an old, unsupported format.
dbtests.sh: #632: Certutil didn't work in a nonexisting dir 255 - PASSED
dbdir selected is ./non_existent_dir

ERROR: Directory "./non_existent_dir" does not exist.
dbtest: function failed: The certificate/key database is in an old, unsupported format.
dbtests.sh: #633: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED

---------------------------------------------------------------
| test force opening the database in a nonexisting directory
---------------------------------------------------------------
dbdir selected is ./non_existent_dir

ERROR: Directory "./non_existent_dir" does not exist.
dbtests.sh: #634: Dbtest force succeeded in a nonexisting dir 0 - PASSED

---------------------------------------------------------------
| test opening the database readonly in an empty directory
---------------------------------------------------------------
tstclnt: unable to open cert database: The certificate/key database is in an old, unsupported format.
dbtests.sh: #635: Tstclnt didn't work in an empty dir 1 - PASSED
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir

database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir/secmod.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir/secmod.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir/cert8.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir/cert8.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir/key3.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir/key3.db" does not exist.
dbtest: function failed: The certificate/key database is in an old, unsupported format.
dbtests.sh: #636: Dbtest readonly didn't work in an empty dir 46 - PASSED
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir

dbtests.sh: #637: Dbtest logout after empty DB Init has key - PASSED
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir

dbtests.sh: #638: Dbtest password DB Init maintains needlogin state - PASSED
certutil: could not find certificate named "xxxx": security library: bad database.
dbtests.sh: #639: Certutil didn't work in an empty dir 255 - PASSED

---------------------------------------------------------------
| test force opening the database  readonly in a empty directory
---------------------------------------------------------------
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir

database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir/secmod.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir/secmod.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir/cert8.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir/cert8.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir/key3.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/emptydir/key3.db" does not exist.
dbtests.sh: #640: Dbtest force readonly succeeded in an empty dir 0 - PASSED

---------------------------------------------------------------
| test opening the database r/w in a readonly directory
---------------------------------------------------------------
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir

ERROR: Directory "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir" is not writeable.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/secmod.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/secmod.db" is not writeable.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/cert8.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/cert8.db" is not writeable.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/key3.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/key3.db" is not writeable.
dbtest: function failed: The certificate/key database is in an old, unsupported format.
dbtests.sh: #641: Dbtest r/w didn't work in an readonly dir 46 - PASSED
certutil: could not find certificate named "TestUser": security library: bad database.
dbtests.sh: #642: Certutil didn't work in an readonly dir 255 - PASSED

---------------------------------------------------------------
| test opening the database ronly in a readonly directory
---------------------------------------------------------------
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir

database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/secmod.db
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/cert8.db
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/key3.db
dbtests.sh: #643: Dbtest readonly succeeded in a readonly dir 0 - PASSED

---------------------------------------------------------------
| test force opening the database  r/w in a readonly directory
---------------------------------------------------------------
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir

ERROR: Directory "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir" is not writeable.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/secmod.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/secmod.db" is not writeable.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/cert8.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/cert8.db" is not writeable.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/key3.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/key3.db" is not writeable.
dbtests.sh: #644: Dbtest force succeeded in a readonly dir 0 - PASSED

---------------------------------------------------------------
| ls -l /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir
---------------------------------------------------------------
dr-xr-xr-x. 2 tinderbox tinderbox   4096 Nov 27 18:56 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir
-r--------. 1 tinderbox tinderbox 131072 Nov 27 18:56 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/cert8.db
-r--------. 1 tinderbox tinderbox  53248 Nov 27 18:56 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/key3.db
-r--r-----. 1 tinderbox tinderbox    393 Nov 27 18:56 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/req
-r--------. 1 tinderbox tinderbox  16384 Nov 27 18:56 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/secmod.db
-r--r-----. 1 tinderbox tinderbox    609 Nov 27 18:56 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/TestUser.cert
-r--r-----. 1 tinderbox tinderbox    579 Nov 27 18:56 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/TestUser-ec.cert
-r--r-----. 1 tinderbox tinderbox    576 Nov 27 18:56 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ronlydir/TestUser-ecmixed.cert

---------------------------------------------------------------
| test creating a new cert with a conflicting nickname
---------------------------------------------------------------
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/conflictdir
certutil: could not add certificate to token or database: Error adding certificate to database.
dbtests.sh: #645: Nicknane conflict test, could not import conflict nickname 255 - PASSED

---------------------------------------------------------------
| test importing an old cert to a conflicting nickname
---------------------------------------------------------------
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 40 (0x28)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:23 2012
            Not After : Mon Nov 27 23:55:23 2017
        Subject: "CN=Bob,E=Bob@bogus.com,O=BOGUS NSS,L=Mountain View,ST=Calif
            ornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:c5:6f:d0:8c:bd:53:97:b4:7d:33:02:5f:f8:51:9b:
                    7b:1b:6e:67:fd:a3:fb:8c:9d:0f:fb:cf:6d:06:ed:76:
                    f2:d1:06:d5:b7:73:f5:81:60:4d:78:94:61:6c:07:52:
                    61:3b:52:0c:c1:ca:5b:3d:a2:2e:70:40:0e:2e:8a:16:
                    7d:96:5f:c7:4b:b5:ad:ea:14:02:fa:1c:3f:a9:95:c0:
                    8f:bd:d5:06:cb:c9:1c:2a:37:66:df:a3:43:7e:fc:d1:
                    ac:16:90:5a:03:06:d8:2e:4e:5c:53:cf:9e:37:7f:da:
                    ad:2b:12:54:75:21:4a:b3:70:db:89:52:3c:c9:0b:07
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        85:c2:42:40:f0:1d:e6:3e:80:5a:cd:33:38:56:80:e4:
        c1:d2:8d:95:07:42:27:30:99:03:7e:6d:56:4e:88:15:
        1f:a3:d2:5d:1d:87:e1:c1:73:5a:f0:65:53:47:1b:12:
        ae:16:6f:36:e1:f1:63:f1:45:51:45:c3:a4:d5:d4:e5:
        bc:0f:c3:3d:64:c2:28:3b:2b:ad:c1:a0:c0:ca:03:9e:
        c5:f6:53:79:e5:4b:b7:7f:cb:aa:11:c0:d8:56:52:4c:
        21:a6:0d:14:74:96:14:e9:17:4f:74:51:5b:e9:85:c7:
        43:9d:8c:27:79:bd:8f:07:54:5f:f4:2f:dd:b8:9f:b1
    Fingerprint (MD5):
        66:EC:C5:E3:29:58:24:E9:8C:9D:18:99:8D:CE:C0:BB
    Fingerprint (SHA1):
        11:BC:BB:A6:E1:69:5D:0A:7F:65:D4:D6:B1:3A:9A:B2:F1:A2:B6:2F

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

dbtests.sh: #646: Nicknane conflict test-setting nickname conflict was correctly rejected - PASSED
TIMESTAMP dbtests END: Tue Nov 27 18:56:04 EST 2012
Running tests for tools
TIMESTAMP tools BEGIN: Tue Nov 27 18:56:04 EST 2012
tools.sh: Tools Tests with ECC ===============================
tools.sh: Exporting Alice's email cert & key - default ciphers
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #647: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                cf:05:d1:4c:05:90:02:51:ec:1c:19:f0:33:cc:07:51
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #648: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #649: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's email EC cert & key---------------
pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \
         -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #650: Exporting Alice's email EC cert & key (pk12util -o)  - PASSED
tools.sh: Importing Alice's email EC cert & key --------------
pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #651: Importing Alice's email EC cert & key (pk12util -i)  - PASSED
tools.sh: Listing Alice's pk12 EC file -----------------
pk12util -l Alice-ec.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice-ec

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                c9:86:08:3c:5b:5f:1f:d6:74:e2:91:c4:24:f8:b0:8b
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Tue Nov 27 23:55:16 2012
            Not After : Mon Nov 27 23:55:16 2062
        Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor
            nia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:23
            EC Public Key:
                PublicValue:
                    04:00:f1:79:3b:f2:d4:94:70:40:9f:e0:c4:59:f6:16:
                    8e:f8:c1:df:08:80:9d:af:6c:6b:f3:8e:72:f6:87:10:
                    a4:7a:f3:e5:47:17:a4:c4:ac:98:8f:51:49:ea:77:05:
                    59:df:1e:b6:d8:d4:00:d7:1a:64:c0:13:11:57:3e:68:
                    73:24:f6:00:01:8c:f4:52:40:8a:21:1d:f5:7d:5b:45:
                    26:da:36:39:bb:0f:e2:b0:7c:cc:b9:30:91:eb:66:f2:
                    58:fe:67:f6:62:85:b4:a1:9f:65:c3:60:ae:66:40:89:
                    32:2d:00:92:f9:35:72:d6:1b:18:98:e7:a6:e1:db:91:
                    75:1f:de:e8:cb
                Curve: SECG elliptic curve secp521r1 (aka NIST P-521)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:88:02:42:01:ae:63:26:63:67:60:3a:06:f3:1c:
        1a:ff:18:3f:a7:91:cc:96:37:b0:ce:78:c5:64:cf:90:
        f5:9f:2c:42:ad:83:a7:cb:42:68:95:1e:dc:b9:68:35:
        aa:7d:0d:b5:4e:8d:96:8e:ca:d9:e2:0a:d9:a9:63:9b:
        ea:23:9b:75:e1:4f:1f:02:42:01:e7:55:92:d1:b4:06:
        60:97:28:0f:87:af:9e:46:b9:a0:bb:54:91:5c:73:4c:
        0f:f9:bf:fb:72:ba:f5:c7:00:33:9a:87:7b:60:ac:c9:
        86:0f:45:34:9f:3e:9f:e6:4a:a9:e0:89:b2:51:de:d6:
        5c:54:ef:64:91:ff:02:4d:0f:87:80
    Fingerprint (MD5):
        9B:36:FA:C2:0E:1F:26:76:CD:34:8F:F3:3C:47:4C:97
    Fingerprint (SHA1):
        E8:77:A2:4F:CA:86:26:80:B3:14:5E:AF:A4:A0:35:BB:5D:16:27:82

    Friendly Name: TestCA-ec

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Tue Nov 27 23:55:23 2012
            Not After : Mon Nov 27 23:55:23 2017
        Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S
            T=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:22
            EC Public Key:
                PublicValue:
                    04:d9:55:dc:f4:97:1c:63:c6:b2:97:bd:68:71:e5:15:
                    fb:59:88:71:68:18:4b:b9:cf:41:1c:89:d8:88:9d:1e:
                    c6:45:a5:8d:ec:84:cb:e6:ac:40:e6:00:24:09:0b:c1:
                    2a:e5:cb:d4:e9:0a:1c:0c:c0:c4:0b:3d:ad:ce:5a:e2:
                    24:d2:bc:f3:90:90:8e:f4:a7:b5:32:58:21:4f:ce:00:
                    f3:7e:60:58:5b:6a:7f:5a:ce:13:4d:da:89:aa:b0:47:
                    9f
                Curve: SECG elliptic curve secp384r1 (aka NIST P-384)
    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:88:02:42:01:24:87:61:4d:3a:be:2d:5e:e6:f7:
        ec:5a:16:63:61:10:df:f4:93:86:cb:7f:49:2b:bf:62:
        45:85:d0:52:26:ef:14:73:c4:a7:ec:e5:82:20:92:bf:
        9d:17:20:05:c8:92:f7:39:f6:4b:07:6e:20:89:f3:db:
        ae:31:a4:d4:ef:ea:c4:02:42:01:ad:12:ff:38:fb:e6:
        06:42:cb:b0:e9:bd:a7:73:c6:e5:7b:72:4d:20:54:a5:
        e4:35:fb:98:ab:e3:82:2f:f3:58:93:26:22:a9:59:21:
        49:c1:08:8e:f1:b2:7d:00:22:98:70:29:2d:3f:1a:06:
        12:7e:59:a2:a3:6c:62:ae:95:68:8b
    Fingerprint (MD5):
        8F:FF:40:B3:FD:46:09:F3:11:D6:88:CF:35:7F:6C:C9
    Fingerprint (SHA1):
        C7:57:97:77:7F:32:F7:88:8C:5C:4B:85:C4:76:D4:E4:F1:C3:74:33

    Friendly Name: Alice-ec

tools.sh: #652: Listing Alice's pk12 EC file (pk12util -l)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #653: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                a8:51:cc:4e:6b:7d:5c:c3:c9:89:86:ce:64:9f:be:92
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #654: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #655: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #656: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                0c:27:76:1c:fb:da:b1:c5:f2:72:e4:92:c1:e6:49:69
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #657: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #658: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #659: Exporting with [RC2-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                9c:dc:21:04:30:ac:26:4c:a9:96:92:24:4e:ee:46:95
            Iteration Count: 2000 (0x7d0)
tools.sh: #660: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #661: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #662: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                ce:9b:2c:68:6e:26:90:31:2f:85:18:37:08:00:a6:8c
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #663: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #664: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #665: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                45:8f:52:ff:c8:9d:eb:d7:10:07:d8:2b:08:41:f2:b3
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #666: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #667: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #668: Exporting with [DES-EDE3-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                e6:01:63:94:1e:64:62:4c:7a:42:88:38:42:a1:20:3e
            Iteration Count: 2000 (0x7d0)
tools.sh: #669: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #670: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #671: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        7c:51:99:7b:b2:19:76:82:17:0c:2d:71:88:34:c0:d7
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:3a:dc:90:79:34:77:22:37:fb:54:f5:94:46:4e:
                    e1:de
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #672: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #673: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #674: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        20:be:32:14:a3:69:66:72:83:e9:cf:45:87:09:a2:f6
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:8a:09:9b:fc:58:02:8f:f9:58:b2:6b:73:d6:9f:
                    26:3d
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #675: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #676: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #677: Exporting with [AES-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        ce:76:f2:c6:bd:4c:fa:b9:21:3b:2c:4f:4b:f1:bc:22
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:5a:45:09:57:7e:8b:e3:ba:6a:15:1a:7c:cb:ac:
                    e8:1d
tools.sh: #678: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #679: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #680: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        77:ad:b9:5f:c9:3a:c0:95:7a:6f:41:87:b4:df:69:2d
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:31:df:03:6a:8b:c6:3d:62:78:ac:db:56:f8:8b:
                    cd:b3
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #681: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #682: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #683: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        bd:22:17:40:40:f4:6c:81:aa:98:ff:8a:c1:91:6c:cf
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:75:49:7c:ec:bc:84:e1:1c:d2:d6:00:8e:ef:72:
                    64:54
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #684: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #685: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #686: Exporting with [AES-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        0f:5f:fc:94:c3:87:40:05:1c:49:cf:5f:d7:9e:05:b4
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:eb:53:c8:7e:d4:b9:7d:86:b5:cf:e2:f2:e8:17:
                    4e:cc
tools.sh: #687: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #688: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #689: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        d9:9b:ba:b9:b8:08:07:c3:9c:21:18:f9:39:6d:ff:e2
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:aa:53:c1:36:62:34:fc:1c:bc:3b:fa:dc:47:c1:
                    cf:ac
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #690: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #691: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #692: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        53:d8:45:c5:db:e4:06:31:d2:83:3b:ed:e0:1e:36:56
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:fd:f4:44:f5:6c:d2:58:da:0c:b2:6e:76:99:0b:
                    9a:d8
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #693: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #694: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #695: Exporting with [AES-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        b4:7d:fd:0e:9a:ea:d9:fb:80:c2:2b:37:83:5c:a7:4e
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:8e:67:ec:46:70:cd:90:d5:64:2c:8d:8d:90:47:
                    90:01
tools.sh: #696: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #697: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #698: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        3d:8c:6c:c2:31:cd:e5:1f:c4:80:d5:09:c3:4d:e8:a5
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:41:10:24:b7:62:af:72:7c:7a:2b:d2:01:9c:02:
                    38:3a
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #699: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #700: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #701: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        1c:32:20:fb:56:e4:4e:6d:b5:f1:94:50:8a:b8:76:3c
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:d5:20:d0:f5:af:e6:47:b3:2b:86:61:d2:cc:45:
                    34:a3
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #702: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #703: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #704: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        91:39:64:aa:13:75:87:5f:73:af:8f:e1:3c:d0:79:50
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:6e:c7:14:47:76:e6:6c:c8:5d:09:89:5c:e8:bf:
                    3d:d9
tools.sh: #705: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #706: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #707: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        e7:22:9b:1e:b9:33:a0:9d:61:e6:a3:5b:b3:5d:d5:f1
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:41:ca:22:e1:78:66:e0:a9:e6:da:ff:9a:df:57:
                    d9:4e
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #708: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #709: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #710: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        2b:da:55:54:20:f9:8b:af:9b:25:0a:53:c5:85:7f:d5
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:9d:63:81:60:8f:c2:5b:39:ac:04:e4:e0:90:04:
                    9a:50
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #711: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #712: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #713: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        d2:09:14:97:6b:96:a4:c0:79:ce:99:d8:62:5f:f2:fc
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:cd:f5:23:52:2e:bd:be:1b:4b:de:f1:6e:de:ae:
                    0f:f3
tools.sh: #714: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #715: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #716: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        f7:81:11:61:81:cd:ba:4f:74:71:57:b0:6c:aa:ad:32
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:20:b5:91:b7:d6:d6:c5:32:9c:13:67:ca:b6:86:
                    45:91
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #717: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #718: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #719: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        19:0e:b9:f9:f7:7d:12:f7:2a:14:74:e5:1d:1a:08:38
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:33:3b:b0:53:0c:87:0f:5c:ca:de:59:c1:a5:54:
                    5c:b6
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #720: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #721: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #722: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        e2:98:cf:58:07:71:92:17:80:96:70:ef:32:86:d6:cd
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:fe:b1:47:f8:3f:31:90:d0:bb:c5:96:4e:07:a0:
                    82:9f
tools.sh: #723: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #724: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #725: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                df:56:17:da:e8:83:98:8f:b1:f8:33:dc:16:7d:f9:ee
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #726: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #727: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #728: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                26:8c:6c:32:68:c4:59:94:7c:9e:b3:2b:6e:df:50:52
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #729: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #730: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #731: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                0d:23:01:d0:f1:a1:02:81:06:5e:f7:7e:7b:bb:48:38
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #732: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #733: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #734: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                db:15:04:27:2d:75:dd:61:c0:d6:f2:db:07:92:70:02
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #735: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #736: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #737: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                56:cd:d4:32:7e:83:d3:4a:04:a0:f2:c6:91:d5:f2:de
            Iteration Count: 2000 (0x7d0)
tools.sh: #738: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #739: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #740: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                d8:f8:22:92:3a:75:52:0e:b8:30:d7:09:6d:51:94:15
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #741: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #742: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #743: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                79:eb:b0:92:42:16:fb:22:85:bf:cf:7f:2f:1e:95:87
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #744: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #745: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #746: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                63:f4:7e:05:10:c1:d9:ff:13:5e:ee:3d:cb:0f:62:68
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #747: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #748: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #749: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                27:ce:94:ea:0e:d5:4b:1e:9f:be:42:7a:a6:ad:cc:a3
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #750: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #751: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #752: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                79:28:f6:3e:a8:3f:88:4a:a7:dd:cd:02:d7:ca:5b:f1
            Iteration Count: 2000 (0x7d0)
tools.sh: #753: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #754: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #755: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                5b:f7:50:2b:50:51:62:6f:b6:63:14:c4:45:34:a0:4c
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #756: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #757: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #758: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                0e:1c:58:15:30:ba:91:ad:c7:eb:e1:e2:0a:7c:c0:ca
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #759: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #760: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #761: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                e1:df:a5:62:10:6b:2e:37:84:34:96:51:ef:aa:c9:27
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #762: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #763: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #764: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                c0:af:4a:5a:16:ab:6d:d8:83:b6:10:d9:1a:14:c5:c6
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #765: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #766: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #767: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                49:8f:c9:67:48:13:59:24:9d:33:2f:d6:62:67:89:28
            Iteration Count: 2000 (0x7d0)
tools.sh: #768: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #769: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #770: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                67:6f:60:5e:4b:fa:0f:6b:e5:a6:35:fd:e4:6c:2c:3c
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #771: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #772: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #773: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                2e:fb:96:8c:ab:f0:a4:dd:70:8c:d5:15:14:aa:02:f7
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #774: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #775: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #776: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                9d:c1:de:64:33:f0:08:e3:c6:e1:7c:e0:37:22:11:ed
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #777: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #778: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #779: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                9c:dc:9a:f0:0b:b2:b5:df:f5:ba:d4:95:50:a4:16:50
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #780: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #781: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:null]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #782: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                d9:2e:dc:f5:c8:4f:ef:37:28:e2:39:c2:2c:a9:4a:b8
            Iteration Count: 2000 (0x7d0)
tools.sh: #783: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #784: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #785: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                f6:16:39:bc:52:86:a0:85:16:00:b9:03:17:d7:90:e9
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #786: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #787: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #788: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                0c:03:01:5d:a7:92:6a:0c:ba:b5:2d:75:43:2b:65:27
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #789: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #790: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #791: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                48:ad:78:39:47:8c:28:e7:55:78:ee:a7:83:22:20:58
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #792: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #793: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #794: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                11:a4:40:18:d7:d9:47:db:b9:06:75:fc:9c:c2:75:4c
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #795: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #796: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #797: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                97:f2:9d:97:2e:38:94:69:b6:5c:0c:63:3d:63:b5:1d
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #798: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #799: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #800: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                87:f4:1b:9a:64:2d:72:7a:5a:80:7b:82:e9:47:e8:f6
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #801: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #802: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #803: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                a1:ff:7e:1f:44:a1:5e:ee:ba:f7:3c:d4:e7:1a:00:14
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #804: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #805: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #806: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                dc:a6:90:d8:20:e8:7c:a9:23:61:4d:0d:f2:11:f9:63
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #807: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #808: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #809: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                e7:b3:13:a7:f6:5f:a5:23:ec:32:48:0d:2a:60:20:ec
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #810: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #811: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #812: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                37:0c:d6:61:37:18:ba:74:c2:33:5c:b5:b5:b5:bf:0a
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #813: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #814: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c null
pk12util: Algorithm: "null": security library: invalid algorithm.
tools.sh: #815: Exporting with [null:default] (pk12util -o)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #816: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Create objsign cert -------------------------------
signtool -G "objectsigner" -d ../tools/signdir -p "nss"

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit the browser before continuing this operation. Enter 
"y" to continue, or anything else to abort: 

Enter certificate information.  All fields are optional. Acceptable
characters are numbers, letters, spaces, and apostrophes.
certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair
certificate request generated
certificate has been signed
certificate "objsigner" added to database
Exported certificate to x509.raw and x509.cacert.
tools.sh: #817: Create objsign cert (signtool -G)  - PASSED
tools.sh: Signing a jar of files ----------------------------
signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> signjs.html
adding ../tools/html/signjs.html to nojs.jar...(deflated 28%)
--> sign.html
adding ../tools/html/sign.html to nojs.jar...(deflated 26%)
Generating zigbert.sf file..
adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%)
adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%)
tree "../tools/html" signed successfully
tools.sh: #818: Signing a jar of files (signtool -Z)  - PASSED
tools.sh: Listing signed files in jar ----------------------
signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner
archive "nojs.jar" has passed crypto verification.
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match
found a RSA signature file: META-INF/zigbert.rsa

          status   path
    ------------   -------------------
        verified   signjs.html
        verified   sign.html
tools.sh: #819: Listing signed files in jar (signtool -v)  - PASSED
tools.sh: Show who signed jar ------------------------------
signtool -w nojs.jar -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #820: Show who signed jar (signtool -w)  - PASSED
tools.sh: Signing a xpi of files ----------------------------
signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> signjs.html
--> sign.html
Generating zigbert.sf file..
Creating XPI Compatible Archive 
adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%)
--> sign.html
adding ../tools/html/sign.html to nojs.xpi...(deflated 26%)
adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%)
tree "../tools/html" signed successfully
tools.sh: #821: Signing a xpi of files (signtool -Z -X)  - PASSED
tools.sh: Listing signed files in xpi ----------------------
signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner
archive "nojs.xpi" has passed crypto verification.
found a RSA signature file: META-INF/zigbert.rsa
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match

          status   path
    ------------   -------------------
        verified   signjs.html
        verified   sign.html
tools.sh: #822: Listing signed files in xpi (signtool -v)  - PASSED
tools.sh: Show who signed xpi ------------------------------
signtool -w nojs.xpi -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #823: Show who signed xpi (signtool -w)  - PASSED
TIMESTAMP tools END: Tue Nov 27 18:56:15 EST 2012
Running tests for fips
TIMESTAMP fips BEGIN: Tue Nov 27 18:56:15 EST 2012
fips.sh: FIPS 140 Compliance Tests ===============================
fips.sh: Verify this module is in FIPS mode  -----------------
modutil -dbdir ../fips -list

Listing of PKCS #11 Modules
-----------------------------------------------------------
  1. NSS Internal FIPS PKCS #11 Module
 slots: 1 slot attached
status: loaded

 slot: NSS FIPS 140-2 User Private Key Services
token: NSS FIPS 140-2 Certificate DB

  2. RootCerts
library name: /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so
 slots: 1 slot attached
status: loaded

 slot: NSS Builtin Objects
token: Builtin Object Token
-----------------------------------------------------------
FIPS mode enabled.
fips.sh: #824: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #825: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys -------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      162e1342f74457c0df3b425bb3cbaf86529eeeee   NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate
fips.sh: #826: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Attempt to list FIPS module keys with incorrect password
certutil -d ../fips -K -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests.fipsbadpw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
Incorrect password/PIN entered.
certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect.
fips.sh: #827: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED
certutil -K returned 255
fips.sh: Validate the certificate --------------------------
certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw
certutil: certificate is valid
fips.sh: #828: Validate the certificate (certutil -V -e) . - PASSED
fips.sh: Export the certificate and key as a PKCS#12 file --
pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 EXPORT SUCCESSFUL
fips.sh: #829: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED
fips.sh: Export the certificate as a DER-encoded file ------
certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt
fips.sh: #830: Export the certificate as a DER (certutil -L -r) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #831: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Delete the certificate and key from the FIPS module
certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw
fips.sh: #832: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #833: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys.
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
certutil: no keys found
fips.sh: #834: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #835: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #836: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      162e1342f74457c0df3b425bb3cbaf86529eeeee   FIPS_PUB_140_Test_Certificate
fips.sh: #837: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Delete the certificate from the FIPS module
certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate
fips.sh: #838: Delete the certificate from the FIPS module (certutil -D) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #839: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #840: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #841: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      162e1342f74457c0df3b425bb3cbaf86529eeeee   FIPS_PUB_140_Test_Certificate
fips.sh: #842: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Run PK11MODE in FIPSMODE  -----------------
pk11mode -d ../fips -p fips- -f ../tests.fipspw
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
**** Total number of TESTS ran in FIPS MODE is 106. ****
**** ALL TESTS PASSED ****
fips.sh: #843: Run PK11MODE in FIPS mode (pk11mode) . - PASSED
fips.sh: Run PK11MODE in Non FIPSMODE  -----------------
pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
**** Total number of TESTS ran in NON FIPS MODE is 104. ****
**** ALL TESTS PASSED ****
fips.sh: #844: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED
mkdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcertdb.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcrmf.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcryptohi.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libdbm.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libjar.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnspr4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnspr4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssb.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckfw.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdbm3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdbm3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdbm.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdev.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsssysinit.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsssysinit.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssutil3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssutil.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs12.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs7.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcertsel.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixchecker.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcrlsel.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixmodule.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixparams.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixpki.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixresults.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixstore.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixsystem.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixutil.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libplc4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libplc4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libplds4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libplds4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsmime3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsmime.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsqlite3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsqlite.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle
fips.sh: Detect mangled softoken--------------------------
mangling /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle/libsoftokn3.so
mangle -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle/libsoftokn3.so -o -8 -b 5
Changing byte 0x000b28a4 (731300): from 5f (95) to 7f (127)
LD_LIBRARY_PATH=/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/fips/mangle dbtest -r -d ../fips
fips.sh: #845: Init NSS with a corrupted library (dbtest -r) . - PASSED
fips.sh done
TIMESTAMP fips END: Tue Nov 27 18:56:28 EST 2012
Running tests for sdr
TIMESTAMP sdr BEGIN: Tue Nov 27 18:56:28 EST 2012
sdr.sh: SDR Tests ===============================
sdr.sh: Creating an SDR key/SDR Encrypt - Value 1
sdrtest -d . -o /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests.v1.12297 -t "Test1"
sdr.sh: #846: Creating SDR Key/Encrypt - Value 1  - PASSED
sdr.sh: SDR Encrypt - Value 2
sdrtest -d . -o /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests.v2.12297 -t "The quick brown fox jumped over the lazy dog"
sdr.sh: #847: Encrypt - Value 2  - PASSED
sdr.sh: SDR Encrypt - Value 3
sdrtest -d . -o /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests.v3.12297 -t "1234567"
sdr.sh: #848: Encrypt - Value 3  - PASSED
sdr.sh: SDR Decrypt - Value 1
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests.v1.12297 -t "Test1"
sdr.sh: #849: Decrypt - Value 1  - PASSED
sdr.sh: SDR Decrypt - Value 2
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests.v2.12297 -t "The quick brown fox jumped over the lazy dog"
sdr.sh: #850: Decrypt - Value 2  - PASSED
sdr.sh: SDR Decrypt - Value 3
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests.v3.12297 -t "1234567"
sdr.sh: #851: Decrypt - Value 3  - PASSED
TIMESTAMP sdr END: Tue Nov 27 18:56:28 EST 2012
Running tests for crmf
TIMESTAMP crmf BEGIN: Tue Nov 27 18:56:28 EST 2012
crmf.sh: CRMF/CMMF Tests ===============================
crmf.sh: CRMF/CMMF Tests ------------------------------
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode

crmftest v1.0
Generating CRMF request
Decoding CRMF request
crmftest: Processing cert request 0
crmftest: Processing cert request 1
Exiting successfully!!!

crmf.sh: #852: CRMF test . - PASSED
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf

crmftest v1.0
Doing CMMF Stuff
Exiting successfully!!!

crmf.sh: #853: CMMF test . - PASSED
TIMESTAMP crmf END: Tue Nov 27 18:56:28 EST 2012
Running tests for smime
TIMESTAMP smime BEGIN: Tue Nov 27 18:56:28 EST 2012
smime.sh: S/MIME Tests with ECC ===============================
smime.sh: Signing Detached Message {SHA1} ------------------
cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1
smime.sh: #854: Create Detached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #855: Verifying Alice's Detached Signature (SHA1) . - PASSED
smime.sh: Signing Attached Message (SHA1) ------------------
cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1
smime.sh: #856: Create Attached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1
smime.sh: #857: Decode Alice's Attached Signature (SHA1) . - PASSED
diff alice.txt alice.data.SHA1
smime.sh: #858: Compare Attached Signed Data and Original (SHA1) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------
cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1
smime.sh: #859: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #860: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------
cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1
smime.sh: #861: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1
smime.sh: #862: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED
diff alice.txt alice-ec.data.SHA1
smime.sh: #863: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Detached Message {SHA256} ------------------
cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256
smime.sh: #864: Create Detached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #865: Verifying Alice's Detached Signature (SHA256) . - PASSED
smime.sh: Signing Attached Message (SHA256) ------------------
cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256
smime.sh: #866: Create Attached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256
smime.sh: #867: Decode Alice's Attached Signature (SHA256) . - PASSED
diff alice.txt alice.data.SHA256
smime.sh: #868: Compare Attached Signed Data and Original (SHA256) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------
cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256
smime.sh: #869: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #870: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------
cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256
smime.sh: #871: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256
smime.sh: #872: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED
diff alice.txt alice-ec.data.SHA256
smime.sh: #873: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Detached Message {SHA384} ------------------
cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384
smime.sh: #874: Create Detached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #875: Verifying Alice's Detached Signature (SHA384) . - PASSED
smime.sh: Signing Attached Message (SHA384) ------------------
cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384
smime.sh: #876: Create Attached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384
smime.sh: #877: Decode Alice's Attached Signature (SHA384) . - PASSED
diff alice.txt alice.data.SHA384
smime.sh: #878: Compare Attached Signed Data and Original (SHA384) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------
cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384
smime.sh: #879: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #880: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------
cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384
smime.sh: #881: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384
smime.sh: #882: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED
diff alice.txt alice-ec.data.SHA384
smime.sh: #883: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Detached Message {SHA512} ------------------
cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512
smime.sh: #884: Create Detached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #885: Verifying Alice's Detached Signature (SHA512) . - PASSED
smime.sh: Signing Attached Message (SHA512) ------------------
cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512
smime.sh: #886: Create Attached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512
smime.sh: #887: Decode Alice's Attached Signature (SHA512) . - PASSED
diff alice.txt alice.data.SHA512
smime.sh: #888: Compare Attached Signed Data and Original (SHA512) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------
cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512
smime.sh: #889: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #890: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------
cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512
smime.sh: #891: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512
smime.sh: #892: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED
diff alice.txt alice-ec.data.SHA512
smime.sh: #893: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED
smime.sh: Enveloped Data Tests ------------------------------
cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \
        -o alice.env
smime.sh: #894: Create Enveloped Data Alice . - PASSED
cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1
smime.sh: #895: Decode Enveloped Data Alice . - PASSED
diff alice.txt alice.data1
smime.sh: #896: Compare Decoded Enveloped Data and Original . - PASSED
smime.sh: Testing multiple recipients ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \
        -r bob@bogus.com,dave@bogus.com
smime.sh: #897: Create Multiple Recipients Enveloped Data Alice . - PASSED
smime.sh: Testing multiple email addrs ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \
        -r eve@bogus.net
smime.sh: #898: Encrypt to a Multiple Email cert . - PASSED
cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2
smime.sh: #899: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED
cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3
smime.sh: #900: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED
cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4
smime.sh: #901: Decrypt with a Multiple Email cert . - PASSED
smime.sh: #902: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED
smime.sh: #903: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED
smime.sh: #904: Compare Decoded with Multiple Email cert . - PASSED
smime.sh: Sending CERTS-ONLY Message ------------------------------
cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \
        -d ../alicedir > co.der
smime.sh: #905: Create Certs-Only Alice . - PASSED
cmsutil -D -i co.der -d ../bobdir
smime.sh: #906: Verify Certs-Only by CA . - PASSED
smime.sh: Encrypted-Data Message ---------------------------------
cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \
        -r "bob@bogus.com" > alice.enc
smime.sh: #907: Create Encrypted-Data . - PASSED
cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \
        -o alice.data2
smime.sh: #908: Decode Encrypted-Data . - PASSED
smime.sh: #909: Compare Decoded and Original Data . - PASSED
smime.sh: p7 util Data Tests ------------------------------
p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env
smime.sh: #910: Creating envelope for user Alice . - PASSED
p7content -d ../alicedir -i alice.env -o alice_p7.data
smime.sh: #911: Verifying file delivered to user Alice . - PASSED
diff alice.txt alice_p7.data.sed
smime.sh: #912: Compare Decoded Enveloped Data and Original . - PASSED
p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e
smime.sh: #913: Signing file for user Alice . - PASSED
p7verify -d ../alicedir -c alice.txt -s alice.sig
Signature is valid.
smime.sh: #914: Verifying file delivered to user Alice . - PASSED
TIMESTAMP smime END: Tue Nov 27 18:56:33 EST 2012
Running tests for ssl
TIMESTAMP ssl BEGIN: Tue Nov 27 18:56:33 EST 2012
ssl.sh: SSL tests ===============================
ssl.sh: CRL SSL Client Tests   - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30393 >/dev/null 2>/dev/null
selfserv with PID 30393 found at Tue Nov 27 18:56:33 EST 2012
selfserv with PID 30393 started at Tue Nov 27 18:56:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #915: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30393 at Tue Nov 27 18:56:33 EST 2012
kill -USR1 30393
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30393 killed at Tue Nov 27 18:56:33 EST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30449 >/dev/null 2>/dev/null
selfserv with PID 30449 found at Tue Nov 27 18:56:33 EST 2012
selfserv with PID 30449 started at Tue Nov 27 18:56:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #916: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30449 at Tue Nov 27 18:56:33 EST 2012
kill -USR1 30449
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30449 killed at Tue Nov 27 18:56:33 EST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30505 >/dev/null 2>/dev/null
selfserv with PID 30505 found at Tue Nov 27 18:56:33 EST 2012
selfserv with PID 30505 started at Tue Nov 27 18:56:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #917: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30505 at Tue Nov 27 18:56:34 EST 2012
kill -USR1 30505
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30505 killed at Tue Nov 27 18:56:34 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:56:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30573 >/dev/null 2>/dev/null
selfserv with PID 30573 found at Tue Nov 27 18:56:34 EST 2012
selfserv with PID 30573 started at Tue Nov 27 18:56:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #918: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30573 at Tue Nov 27 18:56:34 EST 2012
kill -USR1 30573
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30573 killed at Tue Nov 27 18:56:34 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:56:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30629 >/dev/null 2>/dev/null
selfserv with PID 30629 found at Tue Nov 27 18:56:34 EST 2012
selfserv with PID 30629 started at Tue Nov 27 18:56:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #919: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30629 at Tue Nov 27 18:56:34 EST 2012
kill -USR1 30629
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30629 killed at Tue Nov 27 18:56:34 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:56:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30685 >/dev/null 2>/dev/null
selfserv with PID 30685 found at Tue Nov 27 18:56:34 EST 2012
selfserv with PID 30685 started at Tue Nov 27 18:56:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #920: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30685 at Tue Nov 27 18:56:34 EST 2012
kill -USR1 30685
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30685 killed at Tue Nov 27 18:56:34 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:56:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30753 >/dev/null 2>/dev/null
selfserv with PID 30753 found at Tue Nov 27 18:56:34 EST 2012
selfserv with PID 30753 started at Tue Nov 27 18:56:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #921: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30753 at Tue Nov 27 18:56:37 EST 2012
kill -USR1 30753
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30753 killed at Tue Nov 27 18:56:37 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:56:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30809 >/dev/null 2>/dev/null
selfserv with PID 30809 found at Tue Nov 27 18:56:37 EST 2012
selfserv with PID 30809 started at Tue Nov 27 18:56:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #922: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30809 at Tue Nov 27 18:56:37 EST 2012
kill -USR1 30809
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30809 killed at Tue Nov 27 18:56:37 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:56:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30865 >/dev/null 2>/dev/null
selfserv with PID 30865 found at Tue Nov 27 18:56:37 EST 2012
selfserv with PID 30865 started at Tue Nov 27 18:56:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #923: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30865 at Tue Nov 27 18:56:37 EST 2012
kill -USR1 30865
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30865 killed at Tue Nov 27 18:56:37 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30933 >/dev/null 2>/dev/null
selfserv with PID 30933 found at Tue Nov 27 18:56:38 EST 2012
selfserv with PID 30933 started at Tue Nov 27 18:56:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #924: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30933 at Tue Nov 27 18:56:38 EST 2012
kill -USR1 30933
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30933 killed at Tue Nov 27 18:56:38 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30989 >/dev/null 2>/dev/null
selfserv with PID 30989 found at Tue Nov 27 18:56:38 EST 2012
selfserv with PID 30989 started at Tue Nov 27 18:56:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #925: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30989 at Tue Nov 27 18:56:38 EST 2012
kill -USR1 30989
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30989 killed at Tue Nov 27 18:56:38 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31045 >/dev/null 2>/dev/null
selfserv with PID 31045 found at Tue Nov 27 18:56:38 EST 2012
selfserv with PID 31045 started at Tue Nov 27 18:56:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #926: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31045 at Tue Nov 27 18:56:38 EST 2012
kill -USR1 31045
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31045 killed at Tue Nov 27 18:56:38 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:56:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31113 >/dev/null 2>/dev/null
selfserv with PID 31113 found at Tue Nov 27 18:56:38 EST 2012
selfserv with PID 31113 started at Tue Nov 27 18:56:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #927: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31113 at Tue Nov 27 18:56:38 EST 2012
kill -USR1 31113
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31113 killed at Tue Nov 27 18:56:38 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:56:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31169 >/dev/null 2>/dev/null
selfserv with PID 31169 found at Tue Nov 27 18:56:38 EST 2012
selfserv with PID 31169 started at Tue Nov 27 18:56:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #928: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31169 at Tue Nov 27 18:56:38 EST 2012
kill -USR1 31169
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31169 killed at Tue Nov 27 18:56:39 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:56:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31225 >/dev/null 2>/dev/null
selfserv with PID 31225 found at Tue Nov 27 18:56:39 EST 2012
selfserv with PID 31225 started at Tue Nov 27 18:56:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #929: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31225 at Tue Nov 27 18:56:39 EST 2012
kill -USR1 31225
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31225 killed at Tue Nov 27 18:56:39 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:56:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31293 >/dev/null 2>/dev/null
selfserv with PID 31293 found at Tue Nov 27 18:56:39 EST 2012
selfserv with PID 31293 started at Tue Nov 27 18:56:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #930: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31293 at Tue Nov 27 18:56:39 EST 2012
kill -USR1 31293
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31293 killed at Tue Nov 27 18:56:39 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:56:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31349 >/dev/null 2>/dev/null
selfserv with PID 31349 found at Tue Nov 27 18:56:39 EST 2012
selfserv with PID 31349 started at Tue Nov 27 18:56:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #931: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31349 at Tue Nov 27 18:56:39 EST 2012
kill -USR1 31349
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31349 killed at Tue Nov 27 18:56:39 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:56:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31405 >/dev/null 2>/dev/null
selfserv with PID 31405 found at Tue Nov 27 18:56:39 EST 2012
selfserv with PID 31405 started at Tue Nov 27 18:56:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #932: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31405 at Tue Nov 27 18:56:39 EST 2012
kill -USR1 31405
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31405 killed at Tue Nov 27 18:56:39 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31473 >/dev/null 2>/dev/null
selfserv with PID 31473 found at Tue Nov 27 18:56:39 EST 2012
selfserv with PID 31473 started at Tue Nov 27 18:56:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #933: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31473 at Tue Nov 27 18:56:40 EST 2012
kill -USR1 31473
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31473 killed at Tue Nov 27 18:56:40 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31529 >/dev/null 2>/dev/null
selfserv with PID 31529 found at Tue Nov 27 18:56:40 EST 2012
selfserv with PID 31529 started at Tue Nov 27 18:56:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #934: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31529 at Tue Nov 27 18:56:40 EST 2012
kill -USR1 31529
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31529 killed at Tue Nov 27 18:56:40 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31585 >/dev/null 2>/dev/null
selfserv with PID 31585 found at Tue Nov 27 18:56:40 EST 2012
selfserv with PID 31585 started at Tue Nov 27 18:56:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #935: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31585 at Tue Nov 27 18:56:40 EST 2012
kill -USR1 31585
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31585 killed at Tue Nov 27 18:56:40 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:56:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31653 >/dev/null 2>/dev/null
selfserv with PID 31653 found at Tue Nov 27 18:56:40 EST 2012
selfserv with PID 31653 started at Tue Nov 27 18:56:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #936: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31653 at Tue Nov 27 18:56:40 EST 2012
kill -USR1 31653
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31653 killed at Tue Nov 27 18:56:40 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:56:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31709 >/dev/null 2>/dev/null
selfserv with PID 31709 found at Tue Nov 27 18:56:40 EST 2012
selfserv with PID 31709 started at Tue Nov 27 18:56:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #937: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31709 at Tue Nov 27 18:56:40 EST 2012
kill -USR1 31709
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31709 killed at Tue Nov 27 18:56:40 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:56:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31765 >/dev/null 2>/dev/null
selfserv with PID 31765 found at Tue Nov 27 18:56:40 EST 2012
selfserv with PID 31765 started at Tue Nov 27 18:56:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #938: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31765 at Tue Nov 27 18:56:41 EST 2012
kill -USR1 31765
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31765 killed at Tue Nov 27 18:56:41 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:56:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31833 >/dev/null 2>/dev/null
selfserv with PID 31833 found at Tue Nov 27 18:56:41 EST 2012
selfserv with PID 31833 started at Tue Nov 27 18:56:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #939: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31833 at Tue Nov 27 18:56:41 EST 2012
kill -USR1 31833
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31833 killed at Tue Nov 27 18:56:41 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:56:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31889 >/dev/null 2>/dev/null
selfserv with PID 31889 found at Tue Nov 27 18:56:41 EST 2012
selfserv with PID 31889 started at Tue Nov 27 18:56:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #940: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31889 at Tue Nov 27 18:56:41 EST 2012
kill -USR1 31889
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31889 killed at Tue Nov 27 18:56:41 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:56:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31945 >/dev/null 2>/dev/null
selfserv with PID 31945 found at Tue Nov 27 18:56:41 EST 2012
selfserv with PID 31945 started at Tue Nov 27 18:56:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #941: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31945 at Tue Nov 27 18:56:41 EST 2012
kill -USR1 31945
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31945 killed at Tue Nov 27 18:56:41 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32013 >/dev/null 2>/dev/null
selfserv with PID 32013 found at Tue Nov 27 18:56:41 EST 2012
selfserv with PID 32013 started at Tue Nov 27 18:56:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #942: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 32013 at Tue Nov 27 18:56:41 EST 2012
kill -USR1 32013
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32013 killed at Tue Nov 27 18:56:41 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32069 >/dev/null 2>/dev/null
selfserv with PID 32069 found at Tue Nov 27 18:56:41 EST 2012
selfserv with PID 32069 started at Tue Nov 27 18:56:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #943: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 32069 at Tue Nov 27 18:56:42 EST 2012
kill -USR1 32069
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32069 killed at Tue Nov 27 18:56:42 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32125 >/dev/null 2>/dev/null
selfserv with PID 32125 found at Tue Nov 27 18:56:42 EST 2012
selfserv with PID 32125 started at Tue Nov 27 18:56:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #944: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 32125 at Tue Nov 27 18:56:42 EST 2012
kill -USR1 32125
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32125 killed at Tue Nov 27 18:56:42 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:56:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32193 >/dev/null 2>/dev/null
selfserv with PID 32193 found at Tue Nov 27 18:56:42 EST 2012
selfserv with PID 32193 started at Tue Nov 27 18:56:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #945: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 32193 at Tue Nov 27 18:56:42 EST 2012
kill -USR1 32193
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32193 killed at Tue Nov 27 18:56:42 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:56:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32249 >/dev/null 2>/dev/null
selfserv with PID 32249 found at Tue Nov 27 18:56:42 EST 2012
selfserv with PID 32249 started at Tue Nov 27 18:56:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #946: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 32249 at Tue Nov 27 18:56:42 EST 2012
kill -USR1 32249
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32249 killed at Tue Nov 27 18:56:42 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:56:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32305 >/dev/null 2>/dev/null
selfserv with PID 32305 found at Tue Nov 27 18:56:42 EST 2012
selfserv with PID 32305 started at Tue Nov 27 18:56:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #947: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 32305 at Tue Nov 27 18:56:42 EST 2012
kill -USR1 32305
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32305 killed at Tue Nov 27 18:56:42 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:56:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32374 >/dev/null 2>/dev/null
selfserv with PID 32374 found at Tue Nov 27 18:56:42 EST 2012
selfserv with PID 32374 started at Tue Nov 27 18:56:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #948: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 32374 at Tue Nov 27 18:56:43 EST 2012
kill -USR1 32374
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32374 killed at Tue Nov 27 18:56:43 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:56:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32430 >/dev/null 2>/dev/null
selfserv with PID 32430 found at Tue Nov 27 18:56:43 EST 2012
selfserv with PID 32430 started at Tue Nov 27 18:56:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #949: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32430 at Tue Nov 27 18:56:43 EST 2012
kill -USR1 32430
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32430 killed at Tue Nov 27 18:56:43 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:56:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32486 >/dev/null 2>/dev/null
selfserv with PID 32486 found at Tue Nov 27 18:56:43 EST 2012
selfserv with PID 32486 started at Tue Nov 27 18:56:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #950: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 32486 at Tue Nov 27 18:56:43 EST 2012
kill -USR1 32486
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32486 killed at Tue Nov 27 18:56:43 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32554 >/dev/null 2>/dev/null
selfserv with PID 32554 found at Tue Nov 27 18:56:43 EST 2012
selfserv with PID 32554 started at Tue Nov 27 18:56:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #951: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32554 at Tue Nov 27 18:56:43 EST 2012
kill -USR1 32554
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32554 killed at Tue Nov 27 18:56:43 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32610 >/dev/null 2>/dev/null
selfserv with PID 32610 found at Tue Nov 27 18:56:43 EST 2012
selfserv with PID 32610 started at Tue Nov 27 18:56:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #952: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32610 at Tue Nov 27 18:56:44 EST 2012
kill -USR1 32610
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32610 killed at Tue Nov 27 18:56:44 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32666 >/dev/null 2>/dev/null
selfserv with PID 32666 found at Tue Nov 27 18:56:44 EST 2012
selfserv with PID 32666 started at Tue Nov 27 18:56:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #953: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32666 at Tue Nov 27 18:56:44 EST 2012
kill -USR1 32666
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32666 killed at Tue Nov 27 18:56:44 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32734 >/dev/null 2>/dev/null
selfserv with PID 32734 found at Tue Nov 27 18:56:44 EST 2012
selfserv with PID 32734 started at Tue Nov 27 18:56:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #954: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32734 at Tue Nov 27 18:56:44 EST 2012
kill -USR1 32734
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32734 killed at Tue Nov 27 18:56:44 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 325 >/dev/null 2>/dev/null
selfserv with PID 325 found at Tue Nov 27 18:56:44 EST 2012
selfserv with PID 325 started at Tue Nov 27 18:56:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #955: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 325 at Tue Nov 27 18:56:44 EST 2012
kill -USR1 325
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 325 killed at Tue Nov 27 18:56:44 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 383 >/dev/null 2>/dev/null
selfserv with PID 383 found at Tue Nov 27 18:56:44 EST 2012
selfserv with PID 383 started at Tue Nov 27 18:56:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #956: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 383 at Tue Nov 27 18:56:44 EST 2012
kill -USR1 383
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 383 killed at Tue Nov 27 18:56:44 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 457 >/dev/null 2>/dev/null
selfserv with PID 457 found at Tue Nov 27 18:56:44 EST 2012
selfserv with PID 457 started at Tue Nov 27 18:56:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #957: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 457 at Tue Nov 27 18:56:45 EST 2012
kill -USR1 457
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 457 killed at Tue Nov 27 18:56:45 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 524 >/dev/null 2>/dev/null
selfserv with PID 524 found at Tue Nov 27 18:56:45 EST 2012
selfserv with PID 524 started at Tue Nov 27 18:56:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #958: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 524 at Tue Nov 27 18:56:45 EST 2012
kill -USR1 524
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 524 killed at Tue Nov 27 18:56:45 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 595 >/dev/null 2>/dev/null
selfserv with PID 595 found at Tue Nov 27 18:56:45 EST 2012
selfserv with PID 595 started at Tue Nov 27 18:56:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #959: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 595 at Tue Nov 27 18:56:45 EST 2012
kill -USR1 595
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 595 killed at Tue Nov 27 18:56:45 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 678 >/dev/null 2>/dev/null
selfserv with PID 678 found at Tue Nov 27 18:56:45 EST 2012
selfserv with PID 678 started at Tue Nov 27 18:56:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #960: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 678 at Tue Nov 27 18:56:45 EST 2012
kill -USR1 678
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 678 killed at Tue Nov 27 18:56:45 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 739 >/dev/null 2>/dev/null
selfserv with PID 739 found at Tue Nov 27 18:56:45 EST 2012
selfserv with PID 739 started at Tue Nov 27 18:56:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #961: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 739 at Tue Nov 27 18:56:45 EST 2012
kill -USR1 739
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 739 killed at Tue Nov 27 18:56:45 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 796 >/dev/null 2>/dev/null
selfserv with PID 796 found at Tue Nov 27 18:56:46 EST 2012
selfserv with PID 796 started at Tue Nov 27 18:56:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #962: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 796 at Tue Nov 27 18:56:46 EST 2012
kill -USR1 796
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 796 killed at Tue Nov 27 18:56:46 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 889 >/dev/null 2>/dev/null
selfserv with PID 889 found at Tue Nov 27 18:56:46 EST 2012
selfserv with PID 889 started at Tue Nov 27 18:56:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #963: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 889 at Tue Nov 27 18:56:46 EST 2012
kill -USR1 889
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 889 killed at Tue Nov 27 18:56:46 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 976 >/dev/null 2>/dev/null
selfserv with PID 976 found at Tue Nov 27 18:56:46 EST 2012
selfserv with PID 976 started at Tue Nov 27 18:56:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #964: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 976 at Tue Nov 27 18:56:46 EST 2012
kill -USR1 976
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 976 killed at Tue Nov 27 18:56:46 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1032 >/dev/null 2>/dev/null
selfserv with PID 1032 found at Tue Nov 27 18:56:46 EST 2012
selfserv with PID 1032 started at Tue Nov 27 18:56:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #965: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1032 at Tue Nov 27 18:56:46 EST 2012
kill -USR1 1032
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1032 killed at Tue Nov 27 18:56:46 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1100 >/dev/null 2>/dev/null
selfserv with PID 1100 found at Tue Nov 27 18:56:46 EST 2012
selfserv with PID 1100 started at Tue Nov 27 18:56:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #966: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1100 at Tue Nov 27 18:56:47 EST 2012
kill -USR1 1100
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1100 killed at Tue Nov 27 18:56:47 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1156 >/dev/null 2>/dev/null
selfserv with PID 1156 found at Tue Nov 27 18:56:47 EST 2012
selfserv with PID 1156 started at Tue Nov 27 18:56:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #967: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1156 at Tue Nov 27 18:56:47 EST 2012
kill -USR1 1156
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1156 killed at Tue Nov 27 18:56:47 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1212 >/dev/null 2>/dev/null
selfserv with PID 1212 found at Tue Nov 27 18:56:47 EST 2012
selfserv with PID 1212 started at Tue Nov 27 18:56:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #968: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1212 at Tue Nov 27 18:56:47 EST 2012
kill -USR1 1212
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1212 killed at Tue Nov 27 18:56:47 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1280 >/dev/null 2>/dev/null
selfserv with PID 1280 found at Tue Nov 27 18:56:47 EST 2012
selfserv with PID 1280 started at Tue Nov 27 18:56:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #969: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1280 at Tue Nov 27 18:56:47 EST 2012
kill -USR1 1280
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1280 killed at Tue Nov 27 18:56:47 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1336 >/dev/null 2>/dev/null
selfserv with PID 1336 found at Tue Nov 27 18:56:47 EST 2012
selfserv with PID 1336 started at Tue Nov 27 18:56:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #970: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1336 at Tue Nov 27 18:56:47 EST 2012
kill -USR1 1336
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1336 killed at Tue Nov 27 18:56:47 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1392 >/dev/null 2>/dev/null
selfserv with PID 1392 found at Tue Nov 27 18:56:47 EST 2012
selfserv with PID 1392 started at Tue Nov 27 18:56:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #971: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1392 at Tue Nov 27 18:56:48 EST 2012
kill -USR1 1392
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1392 killed at Tue Nov 27 18:56:48 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1460 >/dev/null 2>/dev/null
selfserv with PID 1460 found at Tue Nov 27 18:56:48 EST 2012
selfserv with PID 1460 started at Tue Nov 27 18:56:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #972: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1460 at Tue Nov 27 18:56:48 EST 2012
kill -USR1 1460
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1460 killed at Tue Nov 27 18:56:48 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1517 >/dev/null 2>/dev/null
selfserv with PID 1517 found at Tue Nov 27 18:56:48 EST 2012
selfserv with PID 1517 started at Tue Nov 27 18:56:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #973: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1517 at Tue Nov 27 18:56:48 EST 2012
kill -USR1 1517
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1517 killed at Tue Nov 27 18:56:48 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1573 >/dev/null 2>/dev/null
selfserv with PID 1573 found at Tue Nov 27 18:56:48 EST 2012
selfserv with PID 1573 started at Tue Nov 27 18:56:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #974: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1573 at Tue Nov 27 18:56:48 EST 2012
kill -USR1 1573
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1573 killed at Tue Nov 27 18:56:48 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1641 >/dev/null 2>/dev/null
selfserv with PID 1641 found at Tue Nov 27 18:56:48 EST 2012
selfserv with PID 1641 started at Tue Nov 27 18:56:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #975: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1641 at Tue Nov 27 18:56:49 EST 2012
kill -USR1 1641
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1641 killed at Tue Nov 27 18:56:49 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1697 >/dev/null 2>/dev/null
selfserv with PID 1697 found at Tue Nov 27 18:56:49 EST 2012
selfserv with PID 1697 started at Tue Nov 27 18:56:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #976: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1697 at Tue Nov 27 18:56:49 EST 2012
kill -USR1 1697
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1697 killed at Tue Nov 27 18:56:49 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1753 >/dev/null 2>/dev/null
selfserv with PID 1753 found at Tue Nov 27 18:56:49 EST 2012
selfserv with PID 1753 started at Tue Nov 27 18:56:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #977: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1753 at Tue Nov 27 18:56:49 EST 2012
kill -USR1 1753
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1753 killed at Tue Nov 27 18:56:49 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1821 >/dev/null 2>/dev/null
selfserv with PID 1821 found at Tue Nov 27 18:56:49 EST 2012
selfserv with PID 1821 started at Tue Nov 27 18:56:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #978: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1821 at Tue Nov 27 18:56:49 EST 2012
kill -USR1 1821
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1821 killed at Tue Nov 27 18:56:49 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1877 >/dev/null 2>/dev/null
selfserv with PID 1877 found at Tue Nov 27 18:56:49 EST 2012
selfserv with PID 1877 started at Tue Nov 27 18:56:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #979: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1877 at Tue Nov 27 18:56:49 EST 2012
kill -USR1 1877
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1877 killed at Tue Nov 27 18:56:49 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1933 >/dev/null 2>/dev/null
selfserv with PID 1933 found at Tue Nov 27 18:56:49 EST 2012
selfserv with PID 1933 started at Tue Nov 27 18:56:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #980: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1933 at Tue Nov 27 18:56:50 EST 2012
kill -USR1 1933
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1933 killed at Tue Nov 27 18:56:50 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2001 >/dev/null 2>/dev/null
selfserv with PID 2001 found at Tue Nov 27 18:56:50 EST 2012
selfserv with PID 2001 started at Tue Nov 27 18:56:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #981: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2001 at Tue Nov 27 18:56:50 EST 2012
kill -USR1 2001
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2001 killed at Tue Nov 27 18:56:50 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2057 >/dev/null 2>/dev/null
selfserv with PID 2057 found at Tue Nov 27 18:56:50 EST 2012
selfserv with PID 2057 started at Tue Nov 27 18:56:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #982: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2057 at Tue Nov 27 18:56:50 EST 2012
kill -USR1 2057
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2057 killed at Tue Nov 27 18:56:50 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2113 >/dev/null 2>/dev/null
selfserv with PID 2113 found at Tue Nov 27 18:56:50 EST 2012
selfserv with PID 2113 started at Tue Nov 27 18:56:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #983: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2113 at Tue Nov 27 18:56:50 EST 2012
kill -USR1 2113
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2113 killed at Tue Nov 27 18:56:50 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2181 >/dev/null 2>/dev/null
selfserv with PID 2181 found at Tue Nov 27 18:56:50 EST 2012
selfserv with PID 2181 started at Tue Nov 27 18:56:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #984: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2181 at Tue Nov 27 18:56:50 EST 2012
kill -USR1 2181
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2181 killed at Tue Nov 27 18:56:50 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2238 >/dev/null 2>/dev/null
selfserv with PID 2238 found at Tue Nov 27 18:56:51 EST 2012
selfserv with PID 2238 started at Tue Nov 27 18:56:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #985: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2238 at Tue Nov 27 18:56:51 EST 2012
kill -USR1 2238
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2238 killed at Tue Nov 27 18:56:51 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2294 >/dev/null 2>/dev/null
selfserv with PID 2294 found at Tue Nov 27 18:56:51 EST 2012
selfserv with PID 2294 started at Tue Nov 27 18:56:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #986: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2294 at Tue Nov 27 18:56:51 EST 2012
kill -USR1 2294
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2294 killed at Tue Nov 27 18:56:51 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2362 >/dev/null 2>/dev/null
selfserv with PID 2362 found at Tue Nov 27 18:56:51 EST 2012
selfserv with PID 2362 started at Tue Nov 27 18:56:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #987: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2362 at Tue Nov 27 18:56:51 EST 2012
kill -USR1 2362
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2362 killed at Tue Nov 27 18:56:51 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2418 >/dev/null 2>/dev/null
selfserv with PID 2418 found at Tue Nov 27 18:56:51 EST 2012
selfserv with PID 2418 started at Tue Nov 27 18:56:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #988: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2418 at Tue Nov 27 18:56:51 EST 2012
kill -USR1 2418
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2418 killed at Tue Nov 27 18:56:51 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2474 >/dev/null 2>/dev/null
selfserv with PID 2474 found at Tue Nov 27 18:56:51 EST 2012
selfserv with PID 2474 started at Tue Nov 27 18:56:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #989: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2474 at Tue Nov 27 18:56:52 EST 2012
kill -USR1 2474
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2474 killed at Tue Nov 27 18:56:52 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2542 >/dev/null 2>/dev/null
selfserv with PID 2542 found at Tue Nov 27 18:56:52 EST 2012
selfserv with PID 2542 started at Tue Nov 27 18:56:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #990: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2542 at Tue Nov 27 18:56:52 EST 2012
kill -USR1 2542
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2542 killed at Tue Nov 27 18:56:52 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2598 >/dev/null 2>/dev/null
selfserv with PID 2598 found at Tue Nov 27 18:56:52 EST 2012
selfserv with PID 2598 started at Tue Nov 27 18:56:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #991: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2598 at Tue Nov 27 18:56:52 EST 2012
kill -USR1 2598
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2598 killed at Tue Nov 27 18:56:52 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2654 >/dev/null 2>/dev/null
selfserv with PID 2654 found at Tue Nov 27 18:56:52 EST 2012
selfserv with PID 2654 started at Tue Nov 27 18:56:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #992: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2654 at Tue Nov 27 18:56:52 EST 2012
kill -USR1 2654
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2654 killed at Tue Nov 27 18:56:52 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2723 >/dev/null 2>/dev/null
selfserv with PID 2723 found at Tue Nov 27 18:56:52 EST 2012
selfserv with PID 2723 started at Tue Nov 27 18:56:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #993: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2723 at Tue Nov 27 18:56:53 EST 2012
kill -USR1 2723
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2723 killed at Tue Nov 27 18:56:53 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2779 >/dev/null 2>/dev/null
selfserv with PID 2779 found at Tue Nov 27 18:56:53 EST 2012
selfserv with PID 2779 started at Tue Nov 27 18:56:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #994: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2779 at Tue Nov 27 18:56:53 EST 2012
kill -USR1 2779
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2779 killed at Tue Nov 27 18:56:53 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2835 >/dev/null 2>/dev/null
selfserv with PID 2835 found at Tue Nov 27 18:56:53 EST 2012
selfserv with PID 2835 started at Tue Nov 27 18:56:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #995: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2835 at Tue Nov 27 18:56:53 EST 2012
kill -USR1 2835
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2835 killed at Tue Nov 27 18:56:53 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2903 >/dev/null 2>/dev/null
selfserv with PID 2903 found at Tue Nov 27 18:56:53 EST 2012
selfserv with PID 2903 started at Tue Nov 27 18:56:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #996: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2903 at Tue Nov 27 18:56:53 EST 2012
kill -USR1 2903
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2903 killed at Tue Nov 27 18:56:53 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2959 >/dev/null 2>/dev/null
selfserv with PID 2959 found at Tue Nov 27 18:56:53 EST 2012
selfserv with PID 2959 started at Tue Nov 27 18:56:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #997: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2959 at Tue Nov 27 18:56:53 EST 2012
kill -USR1 2959
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2959 killed at Tue Nov 27 18:56:53 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:56:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3015 >/dev/null 2>/dev/null
selfserv with PID 3015 found at Tue Nov 27 18:56:53 EST 2012
selfserv with PID 3015 started at Tue Nov 27 18:56:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #998: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3015 at Tue Nov 27 18:56:54 EST 2012
kill -USR1 3015
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3015 killed at Tue Nov 27 18:56:54 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3083 >/dev/null 2>/dev/null
selfserv with PID 3083 found at Tue Nov 27 18:56:54 EST 2012
selfserv with PID 3083 started at Tue Nov 27 18:56:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #999: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3083 at Tue Nov 27 18:56:54 EST 2012
kill -USR1 3083
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3083 killed at Tue Nov 27 18:56:54 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3139 >/dev/null 2>/dev/null
selfserv with PID 3139 found at Tue Nov 27 18:56:54 EST 2012
selfserv with PID 3139 started at Tue Nov 27 18:56:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1000: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3139 at Tue Nov 27 18:56:54 EST 2012
kill -USR1 3139
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3139 killed at Tue Nov 27 18:56:54 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:56:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3195 >/dev/null 2>/dev/null
selfserv with PID 3195 found at Tue Nov 27 18:56:54 EST 2012
selfserv with PID 3195 started at Tue Nov 27 18:56:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1001: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3195 at Tue Nov 27 18:56:54 EST 2012
kill -USR1 3195
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3195 killed at Tue Nov 27 18:56:54 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3263 >/dev/null 2>/dev/null
selfserv with PID 3263 found at Tue Nov 27 18:56:54 EST 2012
selfserv with PID 3263 started at Tue Nov 27 18:56:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1002: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3263 at Tue Nov 27 18:56:54 EST 2012
kill -USR1 3263
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3263 killed at Tue Nov 27 18:56:54 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3320 >/dev/null 2>/dev/null
selfserv with PID 3320 found at Tue Nov 27 18:56:54 EST 2012
selfserv with PID 3320 started at Tue Nov 27 18:56:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1003: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3320 at Tue Nov 27 18:56:55 EST 2012
kill -USR1 3320
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3320 killed at Tue Nov 27 18:56:55 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:56:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3376 >/dev/null 2>/dev/null
selfserv with PID 3376 found at Tue Nov 27 18:56:55 EST 2012
selfserv with PID 3376 started at Tue Nov 27 18:56:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1004: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3376 at Tue Nov 27 18:56:55 EST 2012
kill -USR1 3376
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3376 killed at Tue Nov 27 18:56:55 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:56:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3453 >/dev/null 2>/dev/null
selfserv with PID 3453 found at Tue Nov 27 18:56:55 EST 2012
selfserv with PID 3453 started at Tue Nov 27 18:56:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1005: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3453 at Tue Nov 27 18:56:55 EST 2012
kill -USR1 3453
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3453 killed at Tue Nov 27 18:56:55 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:56:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3509 >/dev/null 2>/dev/null
selfserv with PID 3509 found at Tue Nov 27 18:56:55 EST 2012
selfserv with PID 3509 started at Tue Nov 27 18:56:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1006: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3509 at Tue Nov 27 18:56:55 EST 2012
kill -USR1 3509
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3509 killed at Tue Nov 27 18:56:55 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:56:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3565 >/dev/null 2>/dev/null
selfserv with PID 3565 found at Tue Nov 27 18:56:55 EST 2012
selfserv with PID 3565 started at Tue Nov 27 18:56:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1007: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3565 at Tue Nov 27 18:56:56 EST 2012
kill -USR1 3565
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3565 killed at Tue Nov 27 18:56:56 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:56:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3633 >/dev/null 2>/dev/null
selfserv with PID 3633 found at Tue Nov 27 18:56:56 EST 2012
selfserv with PID 3633 started at Tue Nov 27 18:56:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1008: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3633 at Tue Nov 27 18:56:56 EST 2012
kill -USR1 3633
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3633 killed at Tue Nov 27 18:56:56 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:56:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3689 >/dev/null 2>/dev/null
selfserv with PID 3689 found at Tue Nov 27 18:56:56 EST 2012
selfserv with PID 3689 started at Tue Nov 27 18:56:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1009: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3689 at Tue Nov 27 18:56:56 EST 2012
kill -USR1 3689
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3689 killed at Tue Nov 27 18:56:56 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:56:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3745 >/dev/null 2>/dev/null
selfserv with PID 3745 found at Tue Nov 27 18:56:56 EST 2012
selfserv with PID 3745 started at Tue Nov 27 18:56:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1010: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3745 at Tue Nov 27 18:56:56 EST 2012
kill -USR1 3745
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3745 killed at Tue Nov 27 18:56:56 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:56:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3813 >/dev/null 2>/dev/null
selfserv with PID 3813 found at Tue Nov 27 18:56:56 EST 2012
selfserv with PID 3813 started at Tue Nov 27 18:56:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1011: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3813 at Tue Nov 27 18:56:56 EST 2012
kill -USR1 3813
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3813 killed at Tue Nov 27 18:56:56 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:56:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3869 >/dev/null 2>/dev/null
selfserv with PID 3869 found at Tue Nov 27 18:56:57 EST 2012
selfserv with PID 3869 started at Tue Nov 27 18:56:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1012: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3869 at Tue Nov 27 18:56:57 EST 2012
kill -USR1 3869
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3869 killed at Tue Nov 27 18:56:57 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:56:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3925 >/dev/null 2>/dev/null
selfserv with PID 3925 found at Tue Nov 27 18:56:57 EST 2012
selfserv with PID 3925 started at Tue Nov 27 18:56:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1013: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3925 at Tue Nov 27 18:56:57 EST 2012
kill -USR1 3925
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3925 killed at Tue Nov 27 18:56:57 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:56:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3993 >/dev/null 2>/dev/null
selfserv with PID 3993 found at Tue Nov 27 18:56:57 EST 2012
selfserv with PID 3993 started at Tue Nov 27 18:56:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1014: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 3993 at Tue Nov 27 18:56:57 EST 2012
kill -USR1 3993
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3993 killed at Tue Nov 27 18:56:57 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:56:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4049 >/dev/null 2>/dev/null
selfserv with PID 4049 found at Tue Nov 27 18:56:57 EST 2012
selfserv with PID 4049 started at Tue Nov 27 18:56:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1015: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4049 at Tue Nov 27 18:56:57 EST 2012
kill -USR1 4049
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4049 killed at Tue Nov 27 18:56:57 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:56:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4105 >/dev/null 2>/dev/null
selfserv with PID 4105 found at Tue Nov 27 18:56:57 EST 2012
selfserv with PID 4105 started at Tue Nov 27 18:56:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1016: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 4105 at Tue Nov 27 18:56:58 EST 2012
kill -USR1 4105
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4105 killed at Tue Nov 27 18:56:58 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:56:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4173 >/dev/null 2>/dev/null
selfserv with PID 4173 found at Tue Nov 27 18:56:58 EST 2012
selfserv with PID 4173 started at Tue Nov 27 18:56:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1017: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4173 at Tue Nov 27 18:56:58 EST 2012
kill -USR1 4173
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4173 killed at Tue Nov 27 18:56:58 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:56:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4229 >/dev/null 2>/dev/null
selfserv with PID 4229 found at Tue Nov 27 18:56:58 EST 2012
selfserv with PID 4229 started at Tue Nov 27 18:56:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1018: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4229 at Tue Nov 27 18:56:58 EST 2012
kill -USR1 4229
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4229 killed at Tue Nov 27 18:56:58 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:56:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4285 >/dev/null 2>/dev/null
selfserv with PID 4285 found at Tue Nov 27 18:56:58 EST 2012
selfserv with PID 4285 started at Tue Nov 27 18:56:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1019: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4285 at Tue Nov 27 18:56:58 EST 2012
kill -USR1 4285
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4285 killed at Tue Nov 27 18:56:58 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:56:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4353 >/dev/null 2>/dev/null
selfserv with PID 4353 found at Tue Nov 27 18:56:58 EST 2012
selfserv with PID 4353 started at Tue Nov 27 18:56:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1020: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 4353 at Tue Nov 27 18:56:59 EST 2012
kill -USR1 4353
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4353 killed at Tue Nov 27 18:56:59 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:56:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4410 >/dev/null 2>/dev/null
selfserv with PID 4410 found at Tue Nov 27 18:56:59 EST 2012
selfserv with PID 4410 started at Tue Nov 27 18:56:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1021: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4410 at Tue Nov 27 18:56:59 EST 2012
kill -USR1 4410
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4410 killed at Tue Nov 27 18:56:59 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:56:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4466 >/dev/null 2>/dev/null
selfserv with PID 4466 found at Tue Nov 27 18:56:59 EST 2012
selfserv with PID 4466 started at Tue Nov 27 18:56:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1022: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 4466 at Tue Nov 27 18:56:59 EST 2012
kill -USR1 4466
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4466 killed at Tue Nov 27 18:56:59 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:56:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:56:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4534 >/dev/null 2>/dev/null
selfserv with PID 4534 found at Tue Nov 27 18:56:59 EST 2012
selfserv with PID 4534 started at Tue Nov 27 18:56:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1023: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 4534 at Tue Nov 27 18:56:59 EST 2012
kill -USR1 4534
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4534 killed at Tue Nov 27 18:56:59 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4590 >/dev/null 2>/dev/null
selfserv with PID 4590 found at Tue Nov 27 18:57:00 EST 2012
selfserv with PID 4590 started at Tue Nov 27 18:57:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1024: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 4590 at Tue Nov 27 18:57:00 EST 2012
kill -USR1 4590
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4590 killed at Tue Nov 27 18:57:00 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4646 >/dev/null 2>/dev/null
selfserv with PID 4646 found at Tue Nov 27 18:57:00 EST 2012
selfserv with PID 4646 started at Tue Nov 27 18:57:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1025: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 4646 at Tue Nov 27 18:57:00 EST 2012
kill -USR1 4646
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4646 killed at Tue Nov 27 18:57:00 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4714 >/dev/null 2>/dev/null
selfserv with PID 4714 found at Tue Nov 27 18:57:00 EST 2012
selfserv with PID 4714 started at Tue Nov 27 18:57:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1026: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 4714 at Tue Nov 27 18:57:00 EST 2012
kill -USR1 4714
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4714 killed at Tue Nov 27 18:57:00 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4770 >/dev/null 2>/dev/null
selfserv with PID 4770 found at Tue Nov 27 18:57:00 EST 2012
selfserv with PID 4770 started at Tue Nov 27 18:57:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1027: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4770 at Tue Nov 27 18:57:00 EST 2012
kill -USR1 4770
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4770 killed at Tue Nov 27 18:57:00 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4826 >/dev/null 2>/dev/null
selfserv with PID 4826 found at Tue Nov 27 18:57:00 EST 2012
selfserv with PID 4826 started at Tue Nov 27 18:57:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1028: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 4826 at Tue Nov 27 18:57:01 EST 2012
kill -USR1 4826
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4826 killed at Tue Nov 27 18:57:01 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4894 >/dev/null 2>/dev/null
selfserv with PID 4894 found at Tue Nov 27 18:57:01 EST 2012
selfserv with PID 4894 started at Tue Nov 27 18:57:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1029: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4894 at Tue Nov 27 18:57:01 EST 2012
kill -USR1 4894
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4894 killed at Tue Nov 27 18:57:01 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4950 >/dev/null 2>/dev/null
selfserv with PID 4950 found at Tue Nov 27 18:57:01 EST 2012
selfserv with PID 4950 started at Tue Nov 27 18:57:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1030: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4950 at Tue Nov 27 18:57:01 EST 2012
kill -USR1 4950
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4950 killed at Tue Nov 27 18:57:01 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5007 >/dev/null 2>/dev/null
selfserv with PID 5007 found at Tue Nov 27 18:57:01 EST 2012
selfserv with PID 5007 started at Tue Nov 27 18:57:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1031: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5007 at Tue Nov 27 18:57:01 EST 2012
kill -USR1 5007
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5007 killed at Tue Nov 27 18:57:01 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5075 >/dev/null 2>/dev/null
selfserv with PID 5075 found at Tue Nov 27 18:57:01 EST 2012
selfserv with PID 5075 started at Tue Nov 27 18:57:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1032: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5075 at Tue Nov 27 18:57:02 EST 2012
kill -USR1 5075
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5075 killed at Tue Nov 27 18:57:02 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5131 >/dev/null 2>/dev/null
selfserv with PID 5131 found at Tue Nov 27 18:57:02 EST 2012
selfserv with PID 5131 started at Tue Nov 27 18:57:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1033: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5131 at Tue Nov 27 18:57:02 EST 2012
kill -USR1 5131
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5131 killed at Tue Nov 27 18:57:02 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5187 >/dev/null 2>/dev/null
selfserv with PID 5187 found at Tue Nov 27 18:57:02 EST 2012
selfserv with PID 5187 started at Tue Nov 27 18:57:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1034: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5187 at Tue Nov 27 18:57:02 EST 2012
kill -USR1 5187
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5187 killed at Tue Nov 27 18:57:02 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5255 >/dev/null 2>/dev/null
selfserv with PID 5255 found at Tue Nov 27 18:57:02 EST 2012
selfserv with PID 5255 started at Tue Nov 27 18:57:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1035: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5255 at Tue Nov 27 18:57:02 EST 2012
kill -USR1 5255
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5255 killed at Tue Nov 27 18:57:02 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5311 >/dev/null 2>/dev/null
selfserv with PID 5311 found at Tue Nov 27 18:57:02 EST 2012
selfserv with PID 5311 started at Tue Nov 27 18:57:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1036: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5311 at Tue Nov 27 18:57:03 EST 2012
kill -USR1 5311
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5311 killed at Tue Nov 27 18:57:03 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5368 >/dev/null 2>/dev/null
selfserv with PID 5368 found at Tue Nov 27 18:57:03 EST 2012
selfserv with PID 5368 started at Tue Nov 27 18:57:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1037: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5368 at Tue Nov 27 18:57:03 EST 2012
kill -USR1 5368
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5368 killed at Tue Nov 27 18:57:03 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5436 >/dev/null 2>/dev/null
selfserv with PID 5436 found at Tue Nov 27 18:57:03 EST 2012
selfserv with PID 5436 started at Tue Nov 27 18:57:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1038: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5436 at Tue Nov 27 18:57:03 EST 2012
kill -USR1 5436
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5436 killed at Tue Nov 27 18:57:03 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5492 >/dev/null 2>/dev/null
selfserv with PID 5492 found at Tue Nov 27 18:57:03 EST 2012
selfserv with PID 5492 started at Tue Nov 27 18:57:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1039: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5492 at Tue Nov 27 18:57:03 EST 2012
kill -USR1 5492
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5492 killed at Tue Nov 27 18:57:03 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5548 >/dev/null 2>/dev/null
selfserv with PID 5548 found at Tue Nov 27 18:57:03 EST 2012
selfserv with PID 5548 started at Tue Nov 27 18:57:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1040: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5548 at Tue Nov 27 18:57:03 EST 2012
kill -USR1 5548
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5548 killed at Tue Nov 27 18:57:04 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5616 >/dev/null 2>/dev/null
selfserv with PID 5616 found at Tue Nov 27 18:57:04 EST 2012
selfserv with PID 5616 started at Tue Nov 27 18:57:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1041: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5616 at Tue Nov 27 18:57:04 EST 2012
kill -USR1 5616
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5616 killed at Tue Nov 27 18:57:04 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5672 >/dev/null 2>/dev/null
selfserv with PID 5672 found at Tue Nov 27 18:57:04 EST 2012
selfserv with PID 5672 started at Tue Nov 27 18:57:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1042: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5672 at Tue Nov 27 18:57:04 EST 2012
kill -USR1 5672
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5672 killed at Tue Nov 27 18:57:04 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5728 >/dev/null 2>/dev/null
selfserv with PID 5728 found at Tue Nov 27 18:57:04 EST 2012
selfserv with PID 5728 started at Tue Nov 27 18:57:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1043: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5728 at Tue Nov 27 18:57:04 EST 2012
kill -USR1 5728
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5728 killed at Tue Nov 27 18:57:04 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5796 >/dev/null 2>/dev/null
selfserv with PID 5796 found at Tue Nov 27 18:57:04 EST 2012
selfserv with PID 5796 started at Tue Nov 27 18:57:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1044: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5796 at Tue Nov 27 18:57:04 EST 2012
kill -USR1 5796
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5796 killed at Tue Nov 27 18:57:04 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5852 >/dev/null 2>/dev/null
selfserv with PID 5852 found at Tue Nov 27 18:57:04 EST 2012
selfserv with PID 5852 started at Tue Nov 27 18:57:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1045: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5852 at Tue Nov 27 18:57:05 EST 2012
kill -USR1 5852
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5852 killed at Tue Nov 27 18:57:05 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5908 >/dev/null 2>/dev/null
selfserv with PID 5908 found at Tue Nov 27 18:57:05 EST 2012
selfserv with PID 5908 started at Tue Nov 27 18:57:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1046: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5908 at Tue Nov 27 18:57:05 EST 2012
kill -USR1 5908
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5908 killed at Tue Nov 27 18:57:05 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5976 >/dev/null 2>/dev/null
selfserv with PID 5976 found at Tue Nov 27 18:57:05 EST 2012
selfserv with PID 5976 started at Tue Nov 27 18:57:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1047: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5976 at Tue Nov 27 18:57:05 EST 2012
kill -USR1 5976
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5976 killed at Tue Nov 27 18:57:05 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6032 >/dev/null 2>/dev/null
selfserv with PID 6032 found at Tue Nov 27 18:57:05 EST 2012
selfserv with PID 6032 started at Tue Nov 27 18:57:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1048: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6032 at Tue Nov 27 18:57:05 EST 2012
kill -USR1 6032
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6032 killed at Tue Nov 27 18:57:05 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6088 >/dev/null 2>/dev/null
selfserv with PID 6088 found at Tue Nov 27 18:57:05 EST 2012
selfserv with PID 6088 started at Tue Nov 27 18:57:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1049: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6088 at Tue Nov 27 18:57:05 EST 2012
kill -USR1 6088
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6088 killed at Tue Nov 27 18:57:05 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6157 >/dev/null 2>/dev/null
selfserv with PID 6157 found at Tue Nov 27 18:57:06 EST 2012
selfserv with PID 6157 started at Tue Nov 27 18:57:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1050: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6157 at Tue Nov 27 18:57:06 EST 2012
kill -USR1 6157
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6157 killed at Tue Nov 27 18:57:06 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6213 >/dev/null 2>/dev/null
selfserv with PID 6213 found at Tue Nov 27 18:57:06 EST 2012
selfserv with PID 6213 started at Tue Nov 27 18:57:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1051: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6213 at Tue Nov 27 18:57:06 EST 2012
kill -USR1 6213
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6213 killed at Tue Nov 27 18:57:06 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6269 >/dev/null 2>/dev/null
selfserv with PID 6269 found at Tue Nov 27 18:57:06 EST 2012
selfserv with PID 6269 started at Tue Nov 27 18:57:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1052: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6269 at Tue Nov 27 18:57:06 EST 2012
kill -USR1 6269
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6269 killed at Tue Nov 27 18:57:06 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6337 >/dev/null 2>/dev/null
selfserv with PID 6337 found at Tue Nov 27 18:57:06 EST 2012
selfserv with PID 6337 started at Tue Nov 27 18:57:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1053: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6337 at Tue Nov 27 18:57:06 EST 2012
kill -USR1 6337
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6337 killed at Tue Nov 27 18:57:06 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6393 >/dev/null 2>/dev/null
selfserv with PID 6393 found at Tue Nov 27 18:57:07 EST 2012
selfserv with PID 6393 started at Tue Nov 27 18:57:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1054: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6393 at Tue Nov 27 18:57:07 EST 2012
kill -USR1 6393
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6393 killed at Tue Nov 27 18:57:07 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6449 >/dev/null 2>/dev/null
selfserv with PID 6449 found at Tue Nov 27 18:57:07 EST 2012
selfserv with PID 6449 started at Tue Nov 27 18:57:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1055: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6449 at Tue Nov 27 18:57:07 EST 2012
kill -USR1 6449
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6449 killed at Tue Nov 27 18:57:07 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6517 >/dev/null 2>/dev/null
selfserv with PID 6517 found at Tue Nov 27 18:57:07 EST 2012
selfserv with PID 6517 started at Tue Nov 27 18:57:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1056: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6517 at Tue Nov 27 18:57:07 EST 2012
kill -USR1 6517
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6517 killed at Tue Nov 27 18:57:07 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6573 >/dev/null 2>/dev/null
selfserv with PID 6573 found at Tue Nov 27 18:57:07 EST 2012
selfserv with PID 6573 started at Tue Nov 27 18:57:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1057: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6573 at Tue Nov 27 18:57:07 EST 2012
kill -USR1 6573
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6573 killed at Tue Nov 27 18:57:07 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6629 >/dev/null 2>/dev/null
selfserv with PID 6629 found at Tue Nov 27 18:57:07 EST 2012
selfserv with PID 6629 started at Tue Nov 27 18:57:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1058: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6629 at Tue Nov 27 18:57:08 EST 2012
kill -USR1 6629
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6629 killed at Tue Nov 27 18:57:08 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6697 >/dev/null 2>/dev/null
selfserv with PID 6697 found at Tue Nov 27 18:57:08 EST 2012
selfserv with PID 6697 started at Tue Nov 27 18:57:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1059: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6697 at Tue Nov 27 18:57:08 EST 2012
kill -USR1 6697
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6697 killed at Tue Nov 27 18:57:08 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6753 >/dev/null 2>/dev/null
selfserv with PID 6753 found at Tue Nov 27 18:57:08 EST 2012
selfserv with PID 6753 started at Tue Nov 27 18:57:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1060: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6753 at Tue Nov 27 18:57:08 EST 2012
kill -USR1 6753
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6753 killed at Tue Nov 27 18:57:08 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:57:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6809 >/dev/null 2>/dev/null
selfserv with PID 6809 found at Tue Nov 27 18:57:08 EST 2012
selfserv with PID 6809 started at Tue Nov 27 18:57:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1061: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6809 at Tue Nov 27 18:57:08 EST 2012
kill -USR1 6809
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6809 killed at Tue Nov 27 18:57:08 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6877 >/dev/null 2>/dev/null
selfserv with PID 6877 found at Tue Nov 27 18:57:08 EST 2012
selfserv with PID 6877 started at Tue Nov 27 18:57:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1062: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6877 at Tue Nov 27 18:57:09 EST 2012
kill -USR1 6877
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6877 killed at Tue Nov 27 18:57:09 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6933 >/dev/null 2>/dev/null
selfserv with PID 6933 found at Tue Nov 27 18:57:09 EST 2012
selfserv with PID 6933 started at Tue Nov 27 18:57:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1063: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 6933 at Tue Nov 27 18:57:09 EST 2012
kill -USR1 6933
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6933 killed at Tue Nov 27 18:57:09 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6989 >/dev/null 2>/dev/null
selfserv with PID 6989 found at Tue Nov 27 18:57:09 EST 2012
selfserv with PID 6989 started at Tue Nov 27 18:57:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1064: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6989 at Tue Nov 27 18:57:09 EST 2012
kill -USR1 6989
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6989 killed at Tue Nov 27 18:57:09 EST 2012
ssl.sh: Cache CRL SSL Client Tests   - with ECC ===============================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/authin.tl.tmp
0
selfserv starting at Tue Nov 27 18:57:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:09 EST 2012
selfserv with PID 7052 started at Tue Nov 27 18:57:09 EST 2012
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:09 EST 2012
ssl.sh: #1065: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:09 EST 2012
ssl.sh: #1066: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:09 EST 2012
ssl.sh: #1067: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:10 EST 2012
ssl.sh: #1068: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:10 EST 2012
ssl.sh: #1069: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:10 EST 2012
ssl.sh: #1070: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:10 EST 2012
ssl.sh: #1071: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:10 EST 2012
ssl.sh: #1072: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:10 EST 2012
ssl.sh: #1073: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:10 EST 2012
ssl.sh: #1074: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:10 EST 2012
ssl.sh: #1075: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:10 EST 2012
ssl.sh: #1076: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:10 EST 2012
ssl.sh: #1077: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:10 EST 2012
================= CRL Reloaded =============
ssl.sh: #1078: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:10 EST 2012
ssl.sh: #1079: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:11 EST 2012
ssl.sh: #1080: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:11 EST 2012
ssl.sh: #1081: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:11 EST 2012
ssl.sh: #1082: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:11 EST 2012
ssl.sh: #1083: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:11 EST 2012
ssl.sh: #1084: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:11 EST 2012
ssl.sh: #1085: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:11 EST 2012
ssl.sh: #1086: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:11 EST 2012
ssl.sh: #1087: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:11 EST 2012
ssl.sh: #1088: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:11 EST 2012
ssl.sh: #1089: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:11 EST 2012
ssl.sh: #1090: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:11 EST 2012
ssl.sh: #1091: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:12 EST 2012
================= CRL Reloaded =============
ssl.sh: #1092: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:12 EST 2012
ssl.sh: #1093: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:12 EST 2012
ssl.sh: #1094: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:12 EST 2012
ssl.sh: #1095: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:12 EST 2012
ssl.sh: #1096: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:12 EST 2012
ssl.sh: #1097: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:12 EST 2012
ssl.sh: #1098: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:12 EST 2012
ssl.sh: #1099: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:12 EST 2012
ssl.sh: #1100: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:12 EST 2012
ssl.sh: #1101: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:12 EST 2012
ssl.sh: #1102: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:12 EST 2012
ssl.sh: #1103: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:13 EST 2012
ssl.sh: #1104: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 7052 >/dev/null 2>/dev/null
selfserv with PID 7052 found at Tue Nov 27 18:57:13 EST 2012
ssl.sh: #1105: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 7052 at Tue Nov 27 18:57:13 EST 2012
kill -USR1 7052
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 7052 killed at Tue Nov 27 18:57:13 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:57:13 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:13 EST 2012
selfserv with PID 8472 started at Tue Nov 27 18:57:13 EST 2012
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:13 EST 2012
ssl.sh: #1106: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:13 EST 2012
ssl.sh: #1107: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:13 EST 2012
ssl.sh: #1108: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:13 EST 2012
ssl.sh: #1109: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:13 EST 2012
ssl.sh: #1110: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:13 EST 2012
ssl.sh: #1111: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:13 EST 2012
ssl.sh: #1112: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:13 EST 2012
ssl.sh: #1113: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:14 EST 2012
ssl.sh: #1114: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:14 EST 2012
ssl.sh: #1115: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:14 EST 2012
ssl.sh: #1116: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:14 EST 2012
ssl.sh: #1117: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:14 EST 2012
ssl.sh: #1118: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:14 EST 2012
================= CRL Reloaded =============
ssl.sh: #1119: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:14 EST 2012
ssl.sh: #1120: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:14 EST 2012
ssl.sh: #1121: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:14 EST 2012
ssl.sh: #1122: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:14 EST 2012
ssl.sh: #1123: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:14 EST 2012
ssl.sh: #1124: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:15 EST 2012
ssl.sh: #1125: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:15 EST 2012
ssl.sh: #1126: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:15 EST 2012
ssl.sh: #1127: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:15 EST 2012
ssl.sh: #1128: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:15 EST 2012
ssl.sh: #1129: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:15 EST 2012
ssl.sh: #1130: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:15 EST 2012
ssl.sh: #1131: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:15 EST 2012
ssl.sh: #1132: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:15 EST 2012
================= CRL Reloaded =============
ssl.sh: #1133: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:15 EST 2012
ssl.sh: #1134: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:15 EST 2012
ssl.sh: #1135: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:15 EST 2012
ssl.sh: #1136: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:16 EST 2012
ssl.sh: #1137: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:16 EST 2012
ssl.sh: #1138: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:16 EST 2012
ssl.sh: #1139: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:16 EST 2012
ssl.sh: #1140: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:16 EST 2012
ssl.sh: #1141: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:16 EST 2012
ssl.sh: #1142: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:16 EST 2012
ssl.sh: #1143: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:16 EST 2012
ssl.sh: #1144: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:16 EST 2012
ssl.sh: #1145: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 8472 >/dev/null 2>/dev/null
selfserv with PID 8472 found at Tue Nov 27 18:57:16 EST 2012
ssl.sh: #1146: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 8472 at Tue Nov 27 18:57:16 EST 2012
kill -USR1 8472
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8472 killed at Tue Nov 27 18:57:16 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:57:16 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:16 EST 2012
selfserv with PID 9892 started at Tue Nov 27 18:57:16 EST 2012
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:17 EST 2012
ssl.sh: #1147: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:17 EST 2012
ssl.sh: #1148: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:17 EST 2012
ssl.sh: #1149: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:17 EST 2012
ssl.sh: #1150: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:17 EST 2012
ssl.sh: #1151: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:17 EST 2012
ssl.sh: #1152: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:17 EST 2012
ssl.sh: #1153: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:17 EST 2012
ssl.sh: #1154: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:17 EST 2012
ssl.sh: #1155: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:17 EST 2012
ssl.sh: #1156: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:18 EST 2012
ssl.sh: #1157: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:18 EST 2012
ssl.sh: #1158: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:18 EST 2012
ssl.sh: #1159: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:18 EST 2012
================= CRL Reloaded =============
ssl.sh: #1160: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:18 EST 2012
ssl.sh: #1161: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:18 EST 2012
ssl.sh: #1162: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:18 EST 2012
ssl.sh: #1163: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:18 EST 2012
ssl.sh: #1164: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:18 EST 2012
ssl.sh: #1165: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:19 EST 2012
ssl.sh: #1166: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:19 EST 2012
ssl.sh: #1167: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:19 EST 2012
ssl.sh: #1168: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:19 EST 2012
ssl.sh: #1169: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:19 EST 2012
ssl.sh: #1170: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:19 EST 2012
ssl.sh: #1171: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:19 EST 2012
ssl.sh: #1172: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:19 EST 2012
ssl.sh: #1173: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:19 EST 2012
================= CRL Reloaded =============
ssl.sh: #1174: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:20 EST 2012
ssl.sh: #1175: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:20 EST 2012
ssl.sh: #1176: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:20 EST 2012
ssl.sh: #1177: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:20 EST 2012
ssl.sh: #1178: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:20 EST 2012
ssl.sh: #1179: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:20 EST 2012
ssl.sh: #1180: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:20 EST 2012
ssl.sh: #1181: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:20 EST 2012
ssl.sh: #1182: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:20 EST 2012
ssl.sh: #1183: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:20 EST 2012
ssl.sh: #1184: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:21 EST 2012
ssl.sh: #1185: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:21 EST 2012
ssl.sh: #1186: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 9892 >/dev/null 2>/dev/null
selfserv with PID 9892 found at Tue Nov 27 18:57:21 EST 2012
ssl.sh: #1187: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 9892 at Tue Nov 27 18:57:21 EST 2012
kill -USR1 9892
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9892 killed at Tue Nov 27 18:57:21 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:21 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:21 EST 2012
selfserv with PID 11314 started at Tue Nov 27 18:57:21 EST 2012
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:21 EST 2012
ssl.sh: #1188: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:21 EST 2012
ssl.sh: #1189: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:21 EST 2012
ssl.sh: #1190: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:21 EST 2012
ssl.sh: #1191: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:21 EST 2012
ssl.sh: #1192: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:22 EST 2012
ssl.sh: #1193: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:22 EST 2012
ssl.sh: #1194: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:22 EST 2012
ssl.sh: #1195: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:22 EST 2012
ssl.sh: #1196: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:22 EST 2012
ssl.sh: #1197: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:22 EST 2012
ssl.sh: #1198: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:22 EST 2012
ssl.sh: #1199: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:22 EST 2012
ssl.sh: #1200: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:22 EST 2012
================= CRL Reloaded =============
ssl.sh: #1201: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:23 EST 2012
ssl.sh: #1202: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:23 EST 2012
ssl.sh: #1203: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:23 EST 2012
ssl.sh: #1204: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:23 EST 2012
ssl.sh: #1205: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:23 EST 2012
ssl.sh: #1206: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:23 EST 2012
ssl.sh: #1207: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:23 EST 2012
ssl.sh: #1208: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:23 EST 2012
ssl.sh: #1209: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:23 EST 2012
ssl.sh: #1210: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:24 EST 2012
ssl.sh: #1211: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:24 EST 2012
ssl.sh: #1212: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:24 EST 2012
ssl.sh: #1213: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:24 EST 2012
ssl.sh: #1214: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:24 EST 2012
================= CRL Reloaded =============
ssl.sh: #1215: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:24 EST 2012
ssl.sh: #1216: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:24 EST 2012
ssl.sh: #1217: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:24 EST 2012
ssl.sh: #1218: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:24 EST 2012
ssl.sh: #1219: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:25 EST 2012
ssl.sh: #1220: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:25 EST 2012
ssl.sh: #1221: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:25 EST 2012
ssl.sh: #1222: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:25 EST 2012
ssl.sh: #1223: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:25 EST 2012
ssl.sh: #1224: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:25 EST 2012
ssl.sh: #1225: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:25 EST 2012
ssl.sh: #1226: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:25 EST 2012
ssl.sh: #1227: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 11314 >/dev/null 2>/dev/null
selfserv with PID 11314 found at Tue Nov 27 18:57:25 EST 2012
ssl.sh: #1228: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 11314 at Tue Nov 27 18:57:25 EST 2012
kill -USR1 11314
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11314 killed at Tue Nov 27 18:57:25 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:25 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12743 >/dev/null 2>/dev/null
selfserv with PID 12743 found at Tue Nov 27 18:57:25 EST 2012
selfserv with PID 12743 started at Tue Nov 27 18:57:25 EST 2012
trying to kill selfserv with PID 12743 at Tue Nov 27 18:57:25 EST 2012
kill -USR1 12743
./ssl.sh: line 173: 12743 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12743 killed at Tue Nov 27 18:57:25 EST 2012
selfserv starting at Tue Nov 27 18:57:26 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:26 EST 2012
selfserv with PID 12785 started at Tue Nov 27 18:57:26 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:26 EST 2012
ssl.sh: #1229: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:26 EST 2012
ssl.sh: #1230: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:26 EST 2012
ssl.sh: #1231: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:26 EST 2012
ssl.sh: #1232: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:26 EST 2012
ssl.sh: #1233: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:26 EST 2012
ssl.sh: #1234: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:26 EST 2012
ssl.sh: #1235: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:26 EST 2012
ssl.sh: #1236: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:26 EST 2012
ssl.sh: #1237: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:26 EST 2012
ssl.sh: #1238: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:27 EST 2012
ssl.sh: #1239: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:27 EST 2012
ssl.sh: #1240: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:27 EST 2012
ssl.sh: #1241: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:27 EST 2012
================= CRL Reloaded =============
ssl.sh: #1242: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:27 EST 2012
ssl.sh: #1243: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:27 EST 2012
ssl.sh: #1244: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:27 EST 2012
ssl.sh: #1245: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:27 EST 2012
ssl.sh: #1246: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:27 EST 2012
ssl.sh: #1247: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:27 EST 2012
ssl.sh: #1248: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:27 EST 2012
ssl.sh: #1249: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:27 EST 2012
ssl.sh: #1250: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:28 EST 2012
ssl.sh: #1251: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:28 EST 2012
ssl.sh: #1252: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:28 EST 2012
ssl.sh: #1253: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:28 EST 2012
ssl.sh: #1254: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:28 EST 2012
ssl.sh: #1255: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:28 EST 2012
================= CRL Reloaded =============
ssl.sh: #1256: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:28 EST 2012
ssl.sh: #1257: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:28 EST 2012
ssl.sh: #1258: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:28 EST 2012
ssl.sh: #1259: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:28 EST 2012
ssl.sh: #1260: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:29 EST 2012
ssl.sh: #1261: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:29 EST 2012
ssl.sh: #1262: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:29 EST 2012
ssl.sh: #1263: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:29 EST 2012
ssl.sh: #1264: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:29 EST 2012
ssl.sh: #1265: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:29 EST 2012
ssl.sh: #1266: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:29 EST 2012
ssl.sh: #1267: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:29 EST 2012
ssl.sh: #1268: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 12785 >/dev/null 2>/dev/null
selfserv with PID 12785 found at Tue Nov 27 18:57:29 EST 2012
ssl.sh: #1269: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12785 at Tue Nov 27 18:57:29 EST 2012
kill -USR1 12785
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12785 killed at Tue Nov 27 18:57:29 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:57:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:29 EST 2012
selfserv with PID 14205 started at Tue Nov 27 18:57:29 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:29 EST 2012
ssl.sh: #1270: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:30 EST 2012
ssl.sh: #1271: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:30 EST 2012
ssl.sh: #1272: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:30 EST 2012
ssl.sh: #1273: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:30 EST 2012
ssl.sh: #1274: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:30 EST 2012
ssl.sh: #1275: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:30 EST 2012
ssl.sh: #1276: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:30 EST 2012
ssl.sh: #1277: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:30 EST 2012
ssl.sh: #1278: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:30 EST 2012
ssl.sh: #1279: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:30 EST 2012
ssl.sh: #1280: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:31 EST 2012
ssl.sh: #1281: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:31 EST 2012
ssl.sh: #1282: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:31 EST 2012
================= CRL Reloaded =============
ssl.sh: #1283: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:31 EST 2012
ssl.sh: #1284: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:31 EST 2012
ssl.sh: #1285: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:31 EST 2012
ssl.sh: #1286: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:31 EST 2012
ssl.sh: #1287: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:31 EST 2012
ssl.sh: #1288: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:31 EST 2012
ssl.sh: #1289: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:31 EST 2012
ssl.sh: #1290: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:31 EST 2012
ssl.sh: #1291: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:31 EST 2012
ssl.sh: #1292: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:32 EST 2012
ssl.sh: #1293: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:32 EST 2012
ssl.sh: #1294: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:32 EST 2012
ssl.sh: #1295: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:32 EST 2012
ssl.sh: #1296: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:32 EST 2012
================= CRL Reloaded =============
ssl.sh: #1297: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:32 EST 2012
ssl.sh: #1298: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:32 EST 2012
ssl.sh: #1299: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:32 EST 2012
ssl.sh: #1300: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:32 EST 2012
ssl.sh: #1301: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:32 EST 2012
ssl.sh: #1302: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:32 EST 2012
ssl.sh: #1303: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:33 EST 2012
ssl.sh: #1304: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:33 EST 2012
ssl.sh: #1305: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:33 EST 2012
ssl.sh: #1306: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:33 EST 2012
ssl.sh: #1307: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:33 EST 2012
ssl.sh: #1308: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:33 EST 2012
ssl.sh: #1309: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14205 >/dev/null 2>/dev/null
selfserv with PID 14205 found at Tue Nov 27 18:57:33 EST 2012
ssl.sh: #1310: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14205 at Tue Nov 27 18:57:33 EST 2012
kill -USR1 14205
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14205 killed at Tue Nov 27 18:57:33 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:57:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:33 EST 2012
selfserv with PID 15627 started at Tue Nov 27 18:57:33 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:33 EST 2012
ssl.sh: #1311: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:33 EST 2012
ssl.sh: #1312: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:34 EST 2012
ssl.sh: #1313: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:34 EST 2012
ssl.sh: #1314: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:34 EST 2012
ssl.sh: #1315: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:34 EST 2012
ssl.sh: #1316: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:34 EST 2012
ssl.sh: #1317: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:34 EST 2012
ssl.sh: #1318: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:34 EST 2012
ssl.sh: #1319: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:34 EST 2012
ssl.sh: #1320: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:34 EST 2012
ssl.sh: #1321: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:35 EST 2012
ssl.sh: #1322: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:35 EST 2012
ssl.sh: #1323: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:35 EST 2012
================= CRL Reloaded =============
ssl.sh: #1324: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:35 EST 2012
ssl.sh: #1325: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:35 EST 2012
ssl.sh: #1326: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:35 EST 2012
ssl.sh: #1327: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:35 EST 2012
ssl.sh: #1328: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:35 EST 2012
ssl.sh: #1329: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:35 EST 2012
ssl.sh: #1330: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:35 EST 2012
ssl.sh: #1331: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:35 EST 2012
ssl.sh: #1332: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:35 EST 2012
ssl.sh: #1333: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:36 EST 2012
ssl.sh: #1334: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:36 EST 2012
ssl.sh: #1335: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:36 EST 2012
ssl.sh: #1336: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:36 EST 2012
ssl.sh: #1337: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:36 EST 2012
================= CRL Reloaded =============
ssl.sh: #1338: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:36 EST 2012
ssl.sh: #1339: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:36 EST 2012
ssl.sh: #1340: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:36 EST 2012
ssl.sh: #1341: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:36 EST 2012
ssl.sh: #1342: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:36 EST 2012
ssl.sh: #1343: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:36 EST 2012
ssl.sh: #1344: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:36 EST 2012
ssl.sh: #1345: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:37 EST 2012
ssl.sh: #1346: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:37 EST 2012
ssl.sh: #1347: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:37 EST 2012
ssl.sh: #1348: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:37 EST 2012
ssl.sh: #1349: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:37 EST 2012
ssl.sh: #1350: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 15627 >/dev/null 2>/dev/null
selfserv with PID 15627 found at Tue Nov 27 18:57:37 EST 2012
ssl.sh: #1351: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15627 at Tue Nov 27 18:57:37 EST 2012
kill -USR1 15627
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15627 killed at Tue Nov 27 18:57:37 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:57:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:37 EST 2012
selfserv with PID 17047 started at Tue Nov 27 18:57:37 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:37 EST 2012
ssl.sh: #1352: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:37 EST 2012
ssl.sh: #1353: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:37 EST 2012
ssl.sh: #1354: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:38 EST 2012
ssl.sh: #1355: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:38 EST 2012
ssl.sh: #1356: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:38 EST 2012
ssl.sh: #1357: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:38 EST 2012
ssl.sh: #1358: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:38 EST 2012
ssl.sh: #1359: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:38 EST 2012
ssl.sh: #1360: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:38 EST 2012
ssl.sh: #1361: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:39 EST 2012
ssl.sh: #1362: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:39 EST 2012
ssl.sh: #1363: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:39 EST 2012
ssl.sh: #1364: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:39 EST 2012
================= CRL Reloaded =============
ssl.sh: #1365: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:39 EST 2012
ssl.sh: #1366: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:39 EST 2012
ssl.sh: #1367: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:39 EST 2012
ssl.sh: #1368: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:39 EST 2012
ssl.sh: #1369: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:39 EST 2012
ssl.sh: #1370: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:39 EST 2012
ssl.sh: #1371: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:40 EST 2012
ssl.sh: #1372: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:40 EST 2012
ssl.sh: #1373: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:40 EST 2012
ssl.sh: #1374: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:40 EST 2012
ssl.sh: #1375: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:40 EST 2012
ssl.sh: #1376: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:40 EST 2012
ssl.sh: #1377: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:40 EST 2012
ssl.sh: #1378: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:40 EST 2012
================= CRL Reloaded =============
ssl.sh: #1379: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:40 EST 2012
ssl.sh: #1380: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:41 EST 2012
ssl.sh: #1381: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:41 EST 2012
ssl.sh: #1382: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:41 EST 2012
ssl.sh: #1383: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:41 EST 2012
ssl.sh: #1384: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:41 EST 2012
ssl.sh: #1385: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:41 EST 2012
ssl.sh: #1386: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:41 EST 2012
ssl.sh: #1387: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:41 EST 2012
ssl.sh: #1388: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:41 EST 2012
ssl.sh: #1389: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:42 EST 2012
ssl.sh: #1390: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:42 EST 2012
ssl.sh: #1391: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17047 >/dev/null 2>/dev/null
selfserv with PID 17047 found at Tue Nov 27 18:57:42 EST 2012
ssl.sh: #1392: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17047 at Tue Nov 27 18:57:42 EST 2012
kill -USR1 17047
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17047 killed at Tue Nov 27 18:57:42 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:42 EST 2012
selfserv with PID 18469 started at Tue Nov 27 18:57:42 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:42 EST 2012
ssl.sh: #1393: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:42 EST 2012
ssl.sh: #1394: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:42 EST 2012
ssl.sh: #1395: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:42 EST 2012
ssl.sh: #1396: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:42 EST 2012
ssl.sh: #1397: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:43 EST 2012
ssl.sh: #1398: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:43 EST 2012
ssl.sh: #1399: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:43 EST 2012
ssl.sh: #1400: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:43 EST 2012
ssl.sh: #1401: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:43 EST 2012
ssl.sh: #1402: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:43 EST 2012
ssl.sh: #1403: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:43 EST 2012
ssl.sh: #1404: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:43 EST 2012
ssl.sh: #1405: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:44 EST 2012
================= CRL Reloaded =============
ssl.sh: #1406: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:44 EST 2012
ssl.sh: #1407: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:44 EST 2012
ssl.sh: #1408: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:44 EST 2012
ssl.sh: #1409: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:44 EST 2012
ssl.sh: #1410: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:44 EST 2012
ssl.sh: #1411: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:44 EST 2012
ssl.sh: #1412: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:44 EST 2012
ssl.sh: #1413: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:45 EST 2012
ssl.sh: #1414: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:45 EST 2012
ssl.sh: #1415: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:45 EST 2012
ssl.sh: #1416: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:45 EST 2012
ssl.sh: #1417: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:45 EST 2012
ssl.sh: #1418: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:45 EST 2012
ssl.sh: #1419: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:45 EST 2012
================= CRL Reloaded =============
ssl.sh: #1420: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:45 EST 2012
ssl.sh: #1421: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:46 EST 2012
ssl.sh: #1422: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:46 EST 2012
ssl.sh: #1423: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:46 EST 2012
ssl.sh: #1424: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:46 EST 2012
ssl.sh: #1425: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:46 EST 2012
ssl.sh: #1426: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:46 EST 2012
ssl.sh: #1427: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:46 EST 2012
ssl.sh: #1428: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:46 EST 2012
ssl.sh: #1429: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:46 EST 2012
ssl.sh: #1430: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:46 EST 2012
ssl.sh: #1431: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:47 EST 2012
ssl.sh: #1432: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 18469 >/dev/null 2>/dev/null
selfserv with PID 18469 found at Tue Nov 27 18:57:47 EST 2012
ssl.sh: #1433: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18469 at Tue Nov 27 18:57:47 EST 2012
kill -USR1 18469
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18469 killed at Tue Nov 27 18:57:47 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:47 EST 2012
selfserv with PID 19889 started at Tue Nov 27 18:57:47 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:47 EST 2012
ssl.sh: #1434: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:47 EST 2012
ssl.sh: #1435: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:47 EST 2012
ssl.sh: #1436: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:47 EST 2012
ssl.sh: #1437: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:47 EST 2012
ssl.sh: #1438: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:47 EST 2012
ssl.sh: #1439: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:48 EST 2012
ssl.sh: #1440: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:48 EST 2012
ssl.sh: #1441: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:48 EST 2012
ssl.sh: #1442: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:48 EST 2012
ssl.sh: #1443: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:48 EST 2012
ssl.sh: #1444: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:48 EST 2012
ssl.sh: #1445: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:48 EST 2012
ssl.sh: #1446: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:48 EST 2012
================= CRL Reloaded =============
ssl.sh: #1447: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:49 EST 2012
ssl.sh: #1448: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:49 EST 2012
ssl.sh: #1449: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:49 EST 2012
ssl.sh: #1450: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:49 EST 2012
ssl.sh: #1451: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:49 EST 2012
ssl.sh: #1452: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:49 EST 2012
ssl.sh: #1453: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:49 EST 2012
ssl.sh: #1454: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:49 EST 2012
ssl.sh: #1455: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:49 EST 2012
ssl.sh: #1456: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:50 EST 2012
ssl.sh: #1457: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:50 EST 2012
ssl.sh: #1458: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:50 EST 2012
ssl.sh: #1459: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:50 EST 2012
ssl.sh: #1460: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:50 EST 2012
================= CRL Reloaded =============
ssl.sh: #1461: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:50 EST 2012
ssl.sh: #1462: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:50 EST 2012
ssl.sh: #1463: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:50 EST 2012
ssl.sh: #1464: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:50 EST 2012
ssl.sh: #1465: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:51 EST 2012
ssl.sh: #1466: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:51 EST 2012
ssl.sh: #1467: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:51 EST 2012
ssl.sh: #1468: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:51 EST 2012
ssl.sh: #1469: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:51 EST 2012
ssl.sh: #1470: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:51 EST 2012
ssl.sh: #1471: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:51 EST 2012
ssl.sh: #1472: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:51 EST 2012
ssl.sh: #1473: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19889 >/dev/null 2>/dev/null
selfserv with PID 19889 found at Tue Nov 27 18:57:51 EST 2012
ssl.sh: #1474: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19889 at Tue Nov 27 18:57:51 EST 2012
kill -USR1 19889
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19889 killed at Tue Nov 27 18:57:52 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:57:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21310 >/dev/null 2>/dev/null
selfserv with PID 21310 found at Tue Nov 27 18:57:52 EST 2012
selfserv with PID 21310 started at Tue Nov 27 18:57:52 EST 2012
trying to kill selfserv with PID 21310 at Tue Nov 27 18:57:52 EST 2012
kill -USR1 21310
./ssl.sh: line 173: 21310 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21310 killed at Tue Nov 27 18:57:52 EST 2012
selfserv starting at Tue Nov 27 18:57:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:52 EST 2012
selfserv with PID 21352 started at Tue Nov 27 18:57:52 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:52 EST 2012
ssl.sh: #1475: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:52 EST 2012
ssl.sh: #1476: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:52 EST 2012
ssl.sh: #1477: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:52 EST 2012
ssl.sh: #1478: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:52 EST 2012
ssl.sh: #1479: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:52 EST 2012
ssl.sh: #1480: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:52 EST 2012
ssl.sh: #1481: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:52 EST 2012
ssl.sh: #1482: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:52 EST 2012
ssl.sh: #1483: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:53 EST 2012
ssl.sh: #1484: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:53 EST 2012
ssl.sh: #1485: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:53 EST 2012
ssl.sh: #1486: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:53 EST 2012
ssl.sh: #1487: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:53 EST 2012
================= CRL Reloaded =============
ssl.sh: #1488: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:53 EST 2012
ssl.sh: #1489: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:53 EST 2012
ssl.sh: #1490: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:53 EST 2012
ssl.sh: #1491: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:53 EST 2012
ssl.sh: #1492: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:53 EST 2012
ssl.sh: #1493: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:53 EST 2012
ssl.sh: #1494: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:54 EST 2012
ssl.sh: #1495: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:54 EST 2012
ssl.sh: #1496: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:54 EST 2012
ssl.sh: #1497: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:54 EST 2012
ssl.sh: #1498: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:54 EST 2012
ssl.sh: #1499: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:54 EST 2012
ssl.sh: #1500: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:54 EST 2012
ssl.sh: #1501: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:54 EST 2012
================= CRL Reloaded =============
ssl.sh: #1502: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:54 EST 2012
ssl.sh: #1503: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:54 EST 2012
ssl.sh: #1504: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:54 EST 2012
ssl.sh: #1505: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:55 EST 2012
ssl.sh: #1506: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:55 EST 2012
ssl.sh: #1507: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:55 EST 2012
ssl.sh: #1508: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:55 EST 2012
ssl.sh: #1509: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:55 EST 2012
ssl.sh: #1510: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:55 EST 2012
ssl.sh: #1511: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:55 EST 2012
ssl.sh: #1512: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:55 EST 2012
ssl.sh: #1513: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:55 EST 2012
ssl.sh: #1514: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 21352 >/dev/null 2>/dev/null
selfserv with PID 21352 found at Tue Nov 27 18:57:55 EST 2012
ssl.sh: #1515: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21352 at Tue Nov 27 18:57:56 EST 2012
kill -USR1 21352
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21352 killed at Tue Nov 27 18:57:56 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:57:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:56 EST 2012
selfserv with PID 22772 started at Tue Nov 27 18:57:56 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:56 EST 2012
ssl.sh: #1516: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:56 EST 2012
ssl.sh: #1517: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:56 EST 2012
ssl.sh: #1518: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:56 EST 2012
ssl.sh: #1519: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:56 EST 2012
ssl.sh: #1520: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:56 EST 2012
ssl.sh: #1521: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:56 EST 2012
ssl.sh: #1522: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:56 EST 2012
ssl.sh: #1523: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:56 EST 2012
ssl.sh: #1524: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:57 EST 2012
ssl.sh: #1525: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:57 EST 2012
ssl.sh: #1526: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:57 EST 2012
ssl.sh: #1527: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:57 EST 2012
ssl.sh: #1528: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:57 EST 2012
================= CRL Reloaded =============
ssl.sh: #1529: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:57 EST 2012
ssl.sh: #1530: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:57 EST 2012
ssl.sh: #1531: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:57 EST 2012
ssl.sh: #1532: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:57 EST 2012
ssl.sh: #1533: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:57 EST 2012
ssl.sh: #1534: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:57 EST 2012
ssl.sh: #1535: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:57 EST 2012
ssl.sh: #1536: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:58 EST 2012
ssl.sh: #1537: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:58 EST 2012
ssl.sh: #1538: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:58 EST 2012
ssl.sh: #1539: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:58 EST 2012
ssl.sh: #1540: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:58 EST 2012
ssl.sh: #1541: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:58 EST 2012
ssl.sh: #1542: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:58 EST 2012
================= CRL Reloaded =============
ssl.sh: #1543: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:58 EST 2012
ssl.sh: #1544: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:58 EST 2012
ssl.sh: #1545: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:58 EST 2012
ssl.sh: #1546: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:58 EST 2012
ssl.sh: #1547: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:59 EST 2012
ssl.sh: #1548: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:59 EST 2012
ssl.sh: #1549: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:59 EST 2012
ssl.sh: #1550: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:59 EST 2012
ssl.sh: #1551: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:59 EST 2012
ssl.sh: #1552: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:59 EST 2012
ssl.sh: #1553: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:59 EST 2012
ssl.sh: #1554: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:59 EST 2012
ssl.sh: #1555: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22772 >/dev/null 2>/dev/null
selfserv with PID 22772 found at Tue Nov 27 18:57:59 EST 2012
ssl.sh: #1556: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22772 at Tue Nov 27 18:57:59 EST 2012
kill -USR1 22772
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22772 killed at Tue Nov 27 18:57:59 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:57:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:57:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:57:59 EST 2012
selfserv with PID 24192 started at Tue Nov 27 18:57:59 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:00 EST 2012
ssl.sh: #1557: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:00 EST 2012
ssl.sh: #1558: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:00 EST 2012
ssl.sh: #1559: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:00 EST 2012
ssl.sh: #1560: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:00 EST 2012
ssl.sh: #1561: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:00 EST 2012
ssl.sh: #1562: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:00 EST 2012
ssl.sh: #1563: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:00 EST 2012
ssl.sh: #1564: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:00 EST 2012
ssl.sh: #1565: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:00 EST 2012
ssl.sh: #1566: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:00 EST 2012
ssl.sh: #1567: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:01 EST 2012
ssl.sh: #1568: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:01 EST 2012
ssl.sh: #1569: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:01 EST 2012
================= CRL Reloaded =============
ssl.sh: #1570: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:01 EST 2012
ssl.sh: #1571: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:01 EST 2012
ssl.sh: #1572: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:01 EST 2012
ssl.sh: #1573: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:01 EST 2012
ssl.sh: #1574: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:01 EST 2012
ssl.sh: #1575: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:01 EST 2012
ssl.sh: #1576: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:01 EST 2012
ssl.sh: #1577: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:01 EST 2012
ssl.sh: #1578: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:01 EST 2012
ssl.sh: #1579: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:02 EST 2012
ssl.sh: #1580: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:02 EST 2012
ssl.sh: #1581: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:02 EST 2012
ssl.sh: #1582: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:02 EST 2012
ssl.sh: #1583: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 151 bytes
tstclnt: Writing 151 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:02 EST 2012
================= CRL Reloaded =============
ssl.sh: #1584: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:02 EST 2012
ssl.sh: #1585: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:02 EST 2012
ssl.sh: #1586: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:02 EST 2012
ssl.sh: #1587: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:02 EST 2012
ssl.sh: #1588: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:02 EST 2012
ssl.sh: #1589: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:02 EST 2012
ssl.sh: #1590: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:02 EST 2012
ssl.sh: #1591: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:03 EST 2012
ssl.sh: #1592: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:03 EST 2012
ssl.sh: #1593: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:03 EST 2012
ssl.sh: #1594: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:03 EST 2012
ssl.sh: #1595: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:03 EST 2012
ssl.sh: #1596: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24192 >/dev/null 2>/dev/null
selfserv with PID 24192 found at Tue Nov 27 18:58:03 EST 2012
ssl.sh: #1597: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24192 at Tue Nov 27 18:58:03 EST 2012
kill -USR1 24192
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24192 killed at Tue Nov 27 18:58:03 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:58:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:03 EST 2012
selfserv with PID 25622 started at Tue Nov 27 18:58:03 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:03 EST 2012
ssl.sh: #1598: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:03 EST 2012
ssl.sh: #1599: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:04 EST 2012
ssl.sh: #1600: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:04 EST 2012
ssl.sh: #1601: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:04 EST 2012
ssl.sh: #1602: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:04 EST 2012
ssl.sh: #1603: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:04 EST 2012
ssl.sh: #1604: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:04 EST 2012
ssl.sh: #1605: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:04 EST 2012
ssl.sh: #1606: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:04 EST 2012
ssl.sh: #1607: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:05 EST 2012
ssl.sh: #1608: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:05 EST 2012
ssl.sh: #1609: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:05 EST 2012
ssl.sh: #1610: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:05 EST 2012
================= CRL Reloaded =============
ssl.sh: #1611: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:05 EST 2012
ssl.sh: #1612: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:05 EST 2012
ssl.sh: #1613: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:05 EST 2012
ssl.sh: #1614: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:05 EST 2012
ssl.sh: #1615: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:05 EST 2012
ssl.sh: #1616: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:06 EST 2012
ssl.sh: #1617: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:06 EST 2012
ssl.sh: #1618: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:06 EST 2012
ssl.sh: #1619: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:06 EST 2012
ssl.sh: #1620: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:06 EST 2012
ssl.sh: #1621: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:06 EST 2012
ssl.sh: #1622: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:06 EST 2012
ssl.sh: #1623: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:06 EST 2012
ssl.sh: #1624: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:06 EST 2012
================= CRL Reloaded =============
ssl.sh: #1625: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:07 EST 2012
ssl.sh: #1626: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:07 EST 2012
ssl.sh: #1627: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:07 EST 2012
ssl.sh: #1628: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:07 EST 2012
ssl.sh: #1629: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:07 EST 2012
ssl.sh: #1630: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:07 EST 2012
ssl.sh: #1631: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:07 EST 2012
ssl.sh: #1632: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:07 EST 2012
ssl.sh: #1633: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:07 EST 2012
ssl.sh: #1634: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:08 EST 2012
ssl.sh: #1635: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:08 EST 2012
ssl.sh: #1636: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:08 EST 2012
ssl.sh: #1637: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 18:58:08 EST 2012
ssl.sh: #1638: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25622 at Tue Nov 27 18:58:08 EST 2012
kill -USR1 25622
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25622 killed at Tue Nov 27 18:58:08 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:08 EST 2012
selfserv with PID 27042 started at Tue Nov 27 18:58:08 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:08 EST 2012
ssl.sh: #1639: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:08 EST 2012
ssl.sh: #1640: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:08 EST 2012
ssl.sh: #1641: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:09 EST 2012
ssl.sh: #1642: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:09 EST 2012
ssl.sh: #1643: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:09 EST 2012
ssl.sh: #1644: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:09 EST 2012
ssl.sh: #1645: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:09 EST 2012
ssl.sh: #1646: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:09 EST 2012
ssl.sh: #1647: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:09 EST 2012
ssl.sh: #1648: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:09 EST 2012
ssl.sh: #1649: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:10 EST 2012
ssl.sh: #1650: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:10 EST 2012
ssl.sh: #1651: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:10 EST 2012
================= CRL Reloaded =============
ssl.sh: #1652: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:10 EST 2012
ssl.sh: #1653: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:10 EST 2012
ssl.sh: #1654: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:10 EST 2012
ssl.sh: #1655: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:10 EST 2012
ssl.sh: #1656: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:10 EST 2012
ssl.sh: #1657: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:10 EST 2012
ssl.sh: #1658: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:11 EST 2012
ssl.sh: #1659: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:11 EST 2012
ssl.sh: #1660: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:11 EST 2012
ssl.sh: #1661: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:11 EST 2012
ssl.sh: #1662: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:11 EST 2012
ssl.sh: #1663: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:11 EST 2012
ssl.sh: #1664: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:11 EST 2012
ssl.sh: #1665: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:11 EST 2012
================= CRL Reloaded =============
ssl.sh: #1666: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:11 EST 2012
ssl.sh: #1667: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:12 EST 2012
ssl.sh: #1668: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:12 EST 2012
ssl.sh: #1669: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:12 EST 2012
ssl.sh: #1670: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:12 EST 2012
ssl.sh: #1671: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:12 EST 2012
ssl.sh: #1672: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:12 EST 2012
ssl.sh: #1673: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:12 EST 2012
ssl.sh: #1674: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:12 EST 2012
ssl.sh: #1675: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:12 EST 2012
ssl.sh: #1676: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:12 EST 2012
ssl.sh: #1677: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:13 EST 2012
ssl.sh: #1678: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 18:58:13 EST 2012
ssl.sh: #1679: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27042 at Tue Nov 27 18:58:13 EST 2012
kill -USR1 27042
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27042 killed at Tue Nov 27 18:58:13 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:13 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:13 EST 2012
selfserv with PID 28463 started at Tue Nov 27 18:58:13 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:13 EST 2012
ssl.sh: #1680: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:13 EST 2012
ssl.sh: #1681: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:13 EST 2012
ssl.sh: #1682: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:13 EST 2012
ssl.sh: #1683: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:13 EST 2012
ssl.sh: #1684: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:14 EST 2012
ssl.sh: #1685: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:14 EST 2012
ssl.sh: #1686: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:14 EST 2012
ssl.sh: #1687: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:14 EST 2012
ssl.sh: #1688: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:14 EST 2012
ssl.sh: #1689: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:14 EST 2012
ssl.sh: #1690: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:14 EST 2012
ssl.sh: #1691: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:14 EST 2012
ssl.sh: #1692: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:15 EST 2012
================= CRL Reloaded =============
ssl.sh: #1693: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:15 EST 2012
ssl.sh: #1694: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:15 EST 2012
ssl.sh: #1695: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:15 EST 2012
ssl.sh: #1696: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:15 EST 2012
ssl.sh: #1697: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:15 EST 2012
ssl.sh: #1698: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:15 EST 2012
ssl.sh: #1699: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:15 EST 2012
ssl.sh: #1700: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:15 EST 2012
ssl.sh: #1701: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:16 EST 2012
ssl.sh: #1702: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:16 EST 2012
ssl.sh: #1703: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:16 EST 2012
ssl.sh: #1704: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:16 EST 2012
ssl.sh: #1705: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:16 EST 2012
ssl.sh: #1706: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 154 bytes
tstclnt: Writing 154 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:16 EST 2012
================= CRL Reloaded =============
ssl.sh: #1707: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:16 EST 2012
ssl.sh: #1708: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:16 EST 2012
ssl.sh: #1709: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:16 EST 2012
ssl.sh: #1710: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:16 EST 2012
ssl.sh: #1711: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:17 EST 2012
ssl.sh: #1712: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:17 EST 2012
ssl.sh: #1713: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:17 EST 2012
ssl.sh: #1714: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:17 EST 2012
ssl.sh: #1715: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:17 EST 2012
ssl.sh: #1716: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:17 EST 2012
ssl.sh: #1717: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:17 EST 2012
ssl.sh: #1718: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:17 EST 2012
ssl.sh: #1719: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 28463 >/dev/null 2>/dev/null
selfserv with PID 28463 found at Tue Nov 27 18:58:18 EST 2012
ssl.sh: #1720: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28463 at Tue Nov 27 18:58:18 EST 2012
kill -USR1 28463
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28463 killed at Tue Nov 27 18:58:18 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:18 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29884 >/dev/null 2>/dev/null
selfserv with PID 29884 found at Tue Nov 27 18:58:18 EST 2012
selfserv with PID 29884 started at Tue Nov 27 18:58:18 EST 2012
trying to kill selfserv with PID 29884 at Tue Nov 27 18:58:18 EST 2012
kill -USR1 29884
./ssl.sh: line 173: 29884 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29884 killed at Tue Nov 27 18:58:18 EST 2012
ssl.sh: SSL Cipher Coverage  - server bypass/client normal  - with ECC ===============================
selfserv starting at Tue Nov 27 18:58:18 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:18 EST 2012
selfserv with PID 29932 started at Tue Nov 27 18:58:18 EST 2012
ssl.sh: running SSL2_RC4_128_WITH_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c A -V ssl2:ssl3 -O  \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1721: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c B -V ssl2:ssl3 -O  \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1722: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c C -V ssl2:ssl3 -O  \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1723: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c D -V ssl2:ssl3 -O  \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1724: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c E -V ssl2:ssl3 -O  \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1725: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c F -V ssl2:ssl3 -O  \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1726: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c B -V ssl2:tls1.1 -O  \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1727: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c C -V ssl2:tls1.1 -O  \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1728: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c E -V ssl2:tls1.1 -O  \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1729: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1730: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1731: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1732: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1733: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1734: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1735: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1736: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1737: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1738: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1739: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1740: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1741: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1742: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1743: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1744: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1745: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1746: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1747: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1748: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1749: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1750: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1751: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1752: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1753: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1754: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1755: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1756: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1757: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1758: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1759: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1760: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1761: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1762: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1763: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1764: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1765: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1766: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1767: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1768: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1769: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1770: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1771: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1772: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1773: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1774: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1775: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1776: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1777: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1778: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29932 >/dev/null 2>/dev/null
selfserv with PID 29932 found at Tue Nov 27 18:58:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1779: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 29932 at Tue Nov 27 18:58:22 EST 2012
kill -USR1 29932
selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29932 killed at Tue Nov 27 18:58:22 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:58:22 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31523 >/dev/null 2>/dev/null
selfserv with PID 31523 found at Tue Nov 27 18:58:22 EST 2012
selfserv with PID 31523 started at Tue Nov 27 18:58:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1780: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31523 >/dev/null 2>/dev/null
selfserv with PID 31523 found at Tue Nov 27 18:58:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1781: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31523 >/dev/null 2>/dev/null
selfserv with PID 31523 found at Tue Nov 27 18:58:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1782: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31523 >/dev/null 2>/dev/null
selfserv with PID 31523 found at Tue Nov 27 18:58:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1783: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31523 >/dev/null 2>/dev/null
selfserv with PID 31523 found at Tue Nov 27 18:58:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1784: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 31523 at Tue Nov 27 18:58:23 EST 2012
kill -USR1 31523
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31523 killed at Tue Nov 27 18:58:23 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:58:23 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:23 EST 2012
selfserv with PID 31671 started at Tue Nov 27 18:58:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1785: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1786: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1787: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1788: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1789: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1790: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1791: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1792: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1793: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1794: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1795: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1796: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1797: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1798: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31671 >/dev/null 2>/dev/null
selfserv with PID 31671 found at Tue Nov 27 18:58:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1799: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 31671 at Tue Nov 27 18:58:24 EST 2012
kill -USR1 31671
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31671 killed at Tue Nov 27 18:58:24 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:58:24 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32070 >/dev/null 2>/dev/null
selfserv with PID 32070 found at Tue Nov 27 18:58:24 EST 2012
selfserv with PID 32070 started at Tue Nov 27 18:58:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1800: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32070 >/dev/null 2>/dev/null
selfserv with PID 32070 found at Tue Nov 27 18:58:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1801: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32070 >/dev/null 2>/dev/null
selfserv with PID 32070 found at Tue Nov 27 18:58:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1802: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32070 >/dev/null 2>/dev/null
selfserv with PID 32070 found at Tue Nov 27 18:58:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1803: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32070 >/dev/null 2>/dev/null
selfserv with PID 32070 found at Tue Nov 27 18:58:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1804: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 32070 at Tue Nov 27 18:58:25 EST 2012
kill -USR1 32070
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32070 killed at Tue Nov 27 18:58:25 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:58:25 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:25 EST 2012
selfserv with PID 32218 started at Tue Nov 27 18:58:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1805: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1806: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1807: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1808: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1809: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1810: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1811: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1812: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1813: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1814: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1815: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1816: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1817: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1818: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32218 >/dev/null 2>/dev/null
selfserv with PID 32218 found at Tue Nov 27 18:58:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1819: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 32218 at Tue Nov 27 18:58:26 EST 2012
kill -USR1 32218
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32218 killed at Tue Nov 27 18:58:26 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:58:26 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32604 >/dev/null 2>/dev/null
selfserv with PID 32604 found at Tue Nov 27 18:58:26 EST 2012
selfserv with PID 32604 started at Tue Nov 27 18:58:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1820: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32604 >/dev/null 2>/dev/null
selfserv with PID 32604 found at Tue Nov 27 18:58:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1821: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32604 >/dev/null 2>/dev/null
selfserv with PID 32604 found at Tue Nov 27 18:58:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1822: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32604 >/dev/null 2>/dev/null
selfserv with PID 32604 found at Tue Nov 27 18:58:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1823: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32604 >/dev/null 2>/dev/null
selfserv with PID 32604 found at Tue Nov 27 18:58:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1824: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 32604 at Tue Nov 27 18:58:27 EST 2012
kill -USR1 32604
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32604 killed at Tue Nov 27 18:58:27 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:58:27 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32752 >/dev/null 2>/dev/null
selfserv with PID 32752 found at Tue Nov 27 18:58:27 EST 2012
selfserv with PID 32752 started at Tue Nov 27 18:58:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1825: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32752 >/dev/null 2>/dev/null
selfserv with PID 32752 found at Tue Nov 27 18:58:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1826: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32752 >/dev/null 2>/dev/null
selfserv with PID 32752 found at Tue Nov 27 18:58:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1827: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32752 >/dev/null 2>/dev/null
selfserv with PID 32752 found at Tue Nov 27 18:58:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1828: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32752 >/dev/null 2>/dev/null
selfserv with PID 32752 found at Tue Nov 27 18:58:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1829: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32752 at Tue Nov 27 18:58:27 EST 2012
kill -USR1 32752
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32752 killed at Tue Nov 27 18:58:27 EST 2012
ssl.sh: SSL Client Authentication  - server bypass/client normal  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:58:27 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 499 >/dev/null 2>/dev/null
selfserv with PID 499 found at Tue Nov 27 18:58:27 EST 2012
selfserv with PID 499 started at Tue Nov 27 18:58:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1830: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 499 at Tue Nov 27 18:58:27 EST 2012
kill -USR1 499
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 499 killed at Tue Nov 27 18:58:27 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:58:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 571 >/dev/null 2>/dev/null
selfserv with PID 571 found at Tue Nov 27 18:58:28 EST 2012
selfserv with PID 571 started at Tue Nov 27 18:58:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1831: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 571 at Tue Nov 27 18:58:28 EST 2012
kill -USR1 571
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 571 killed at Tue Nov 27 18:58:28 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:58:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 640 >/dev/null 2>/dev/null
selfserv with PID 640 found at Tue Nov 27 18:58:28 EST 2012
selfserv with PID 640 started at Tue Nov 27 18:58:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1832: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 640 at Tue Nov 27 18:58:28 EST 2012
kill -USR1 640
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 640 killed at Tue Nov 27 18:58:28 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:58:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 710 >/dev/null 2>/dev/null
selfserv with PID 710 found at Tue Nov 27 18:58:28 EST 2012
selfserv with PID 710 started at Tue Nov 27 18:58:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1833: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 710 at Tue Nov 27 18:58:28 EST 2012
kill -USR1 710
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 710 killed at Tue Nov 27 18:58:28 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:58:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 768 >/dev/null 2>/dev/null
selfserv with PID 768 found at Tue Nov 27 18:58:28 EST 2012
selfserv with PID 768 started at Tue Nov 27 18:58:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1834: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 768 at Tue Nov 27 18:58:28 EST 2012
kill -USR1 768
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 768 killed at Tue Nov 27 18:58:28 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:58:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 834 >/dev/null 2>/dev/null
selfserv with PID 834 found at Tue Nov 27 18:58:28 EST 2012
selfserv with PID 834 started at Tue Nov 27 18:58:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n TestUser   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1835: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 834 at Tue Nov 27 18:58:29 EST 2012
kill -USR1 834
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 834 killed at Tue Nov 27 18:58:29 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:58:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 908 >/dev/null 2>/dev/null
selfserv with PID 908 found at Tue Nov 27 18:58:29 EST 2012
selfserv with PID 908 started at Tue Nov 27 18:58:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1836: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 908 at Tue Nov 27 18:58:29 EST 2012
kill -USR1 908
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 908 killed at Tue Nov 27 18:58:29 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:58:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 996 >/dev/null 2>/dev/null
selfserv with PID 996 found at Tue Nov 27 18:58:29 EST 2012
selfserv with PID 996 started at Tue Nov 27 18:58:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1837: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 996 at Tue Nov 27 18:58:29 EST 2012
kill -USR1 996
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 996 killed at Tue Nov 27 18:58:29 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:58:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1053 >/dev/null 2>/dev/null
selfserv with PID 1053 found at Tue Nov 27 18:58:29 EST 2012
selfserv with PID 1053 started at Tue Nov 27 18:58:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1838: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1053 at Tue Nov 27 18:58:29 EST 2012
kill -USR1 1053
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1053 killed at Tue Nov 27 18:58:29 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:58:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1110 >/dev/null 2>/dev/null
selfserv with PID 1110 found at Tue Nov 27 18:58:29 EST 2012
selfserv with PID 1110 started at Tue Nov 27 18:58:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1839: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1110 at Tue Nov 27 18:58:29 EST 2012
kill -USR1 1110
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1110 killed at Tue Nov 27 18:58:29 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:58:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1167 >/dev/null 2>/dev/null
selfserv with PID 1167 found at Tue Nov 27 18:58:29 EST 2012
selfserv with PID 1167 started at Tue Nov 27 18:58:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1840: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1167 at Tue Nov 27 18:58:30 EST 2012
kill -USR1 1167
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1167 killed at Tue Nov 27 18:58:30 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:58:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1224 >/dev/null 2>/dev/null
selfserv with PID 1224 found at Tue Nov 27 18:58:30 EST 2012
selfserv with PID 1224 started at Tue Nov 27 18:58:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1841: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1224 at Tue Nov 27 18:58:30 EST 2012
kill -USR1 1224
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1224 killed at Tue Nov 27 18:58:30 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:58:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1281 >/dev/null 2>/dev/null
selfserv with PID 1281 found at Tue Nov 27 18:58:30 EST 2012
selfserv with PID 1281 started at Tue Nov 27 18:58:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1842: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1281 at Tue Nov 27 18:58:30 EST 2012
kill -USR1 1281
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1281 killed at Tue Nov 27 18:58:30 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:58:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1338 >/dev/null 2>/dev/null
selfserv with PID 1338 found at Tue Nov 27 18:58:30 EST 2012
selfserv with PID 1338 started at Tue Nov 27 18:58:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1843: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1338 at Tue Nov 27 18:58:30 EST 2012
kill -USR1 1338
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1338 killed at Tue Nov 27 18:58:30 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:58:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1395 >/dev/null 2>/dev/null
selfserv with PID 1395 found at Tue Nov 27 18:58:30 EST 2012
selfserv with PID 1395 started at Tue Nov 27 18:58:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1844: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1395 at Tue Nov 27 18:58:30 EST 2012
kill -USR1 1395
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1395 killed at Tue Nov 27 18:58:30 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:58:31 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1452 >/dev/null 2>/dev/null
selfserv with PID 1452 found at Tue Nov 27 18:58:31 EST 2012
selfserv with PID 1452 started at Tue Nov 27 18:58:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1845: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1452 at Tue Nov 27 18:58:31 EST 2012
kill -USR1 1452
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1452 killed at Tue Nov 27 18:58:31 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:58:31 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1510 >/dev/null 2>/dev/null
selfserv with PID 1510 found at Tue Nov 27 18:58:31 EST 2012
selfserv with PID 1510 started at Tue Nov 27 18:58:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1846: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1510 at Tue Nov 27 18:58:31 EST 2012
kill -USR1 1510
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1510 killed at Tue Nov 27 18:58:31 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:58:31 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1567 >/dev/null 2>/dev/null
selfserv with PID 1567 found at Tue Nov 27 18:58:31 EST 2012
selfserv with PID 1567 started at Tue Nov 27 18:58:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1847: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1567 at Tue Nov 27 18:58:31 EST 2012
kill -USR1 1567
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1567 killed at Tue Nov 27 18:58:31 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:58:31 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1624 >/dev/null 2>/dev/null
selfserv with PID 1624 found at Tue Nov 27 18:58:31 EST 2012
selfserv with PID 1624 started at Tue Nov 27 18:58:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1848: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1624 at Tue Nov 27 18:58:31 EST 2012
kill -USR1 1624
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1624 killed at Tue Nov 27 18:58:31 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:58:31 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1681 >/dev/null 2>/dev/null
selfserv with PID 1681 found at Tue Nov 27 18:58:31 EST 2012
selfserv with PID 1681 started at Tue Nov 27 18:58:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1849: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1681 at Tue Nov 27 18:58:32 EST 2012
kill -USR1 1681
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1681 killed at Tue Nov 27 18:58:32 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:58:32 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1738 >/dev/null 2>/dev/null
selfserv with PID 1738 found at Tue Nov 27 18:58:32 EST 2012
selfserv with PID 1738 started at Tue Nov 27 18:58:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1850: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1738 at Tue Nov 27 18:58:32 EST 2012
kill -USR1 1738
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1738 killed at Tue Nov 27 18:58:32 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:58:32 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1795 >/dev/null 2>/dev/null
selfserv with PID 1795 found at Tue Nov 27 18:58:32 EST 2012
selfserv with PID 1795 started at Tue Nov 27 18:58:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1851: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1795 at Tue Nov 27 18:58:32 EST 2012
kill -USR1 1795
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1795 killed at Tue Nov 27 18:58:32 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:58:32 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1852 >/dev/null 2>/dev/null
selfserv with PID 1852 found at Tue Nov 27 18:58:32 EST 2012
selfserv with PID 1852 started at Tue Nov 27 18:58:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1852: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1852 at Tue Nov 27 18:58:32 EST 2012
kill -USR1 1852
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1852 killed at Tue Nov 27 18:58:32 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:58:32 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1909 >/dev/null 2>/dev/null
selfserv with PID 1909 found at Tue Nov 27 18:58:32 EST 2012
selfserv with PID 1909 started at Tue Nov 27 18:58:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1853: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1909 at Tue Nov 27 18:58:32 EST 2012
kill -USR1 1909
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1909 killed at Tue Nov 27 18:58:32 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:58:32 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1966 >/dev/null 2>/dev/null
selfserv with PID 1966 found at Tue Nov 27 18:58:32 EST 2012
selfserv with PID 1966 started at Tue Nov 27 18:58:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1854: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1966 at Tue Nov 27 18:58:33 EST 2012
kill -USR1 1966
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1966 killed at Tue Nov 27 18:58:33 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:58:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2023 >/dev/null 2>/dev/null
selfserv with PID 2023 found at Tue Nov 27 18:58:33 EST 2012
selfserv with PID 2023 started at Tue Nov 27 18:58:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1855: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2023 at Tue Nov 27 18:58:33 EST 2012
kill -USR1 2023
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2023 killed at Tue Nov 27 18:58:33 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:58:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2080 >/dev/null 2>/dev/null
selfserv with PID 2080 found at Tue Nov 27 18:58:33 EST 2012
selfserv with PID 2080 started at Tue Nov 27 18:58:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1856: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2080 at Tue Nov 27 18:58:33 EST 2012
kill -USR1 2080
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2080 killed at Tue Nov 27 18:58:33 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:58:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2137 >/dev/null 2>/dev/null
selfserv with PID 2137 found at Tue Nov 27 18:58:33 EST 2012
selfserv with PID 2137 started at Tue Nov 27 18:58:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1857: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2137 at Tue Nov 27 18:58:33 EST 2012
kill -USR1 2137
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2137 killed at Tue Nov 27 18:58:33 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:58:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2195 >/dev/null 2>/dev/null
selfserv with PID 2195 found at Tue Nov 27 18:58:33 EST 2012
selfserv with PID 2195 started at Tue Nov 27 18:58:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1858: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2195 at Tue Nov 27 18:58:33 EST 2012
kill -USR1 2195
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2195 killed at Tue Nov 27 18:58:33 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:58:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2252 >/dev/null 2>/dev/null
selfserv with PID 2252 found at Tue Nov 27 18:58:34 EST 2012
selfserv with PID 2252 started at Tue Nov 27 18:58:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1859: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2252 at Tue Nov 27 18:58:34 EST 2012
kill -USR1 2252
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2252 killed at Tue Nov 27 18:58:34 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:58:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2324 >/dev/null 2>/dev/null
selfserv with PID 2324 found at Tue Nov 27 18:58:34 EST 2012
selfserv with PID 2324 started at Tue Nov 27 18:58:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1860: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2324 at Tue Nov 27 18:58:34 EST 2012
kill -USR1 2324
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2324 killed at Tue Nov 27 18:58:34 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2381 >/dev/null 2>/dev/null
selfserv with PID 2381 found at Tue Nov 27 18:58:34 EST 2012
selfserv with PID 2381 started at Tue Nov 27 18:58:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1861: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2381 at Tue Nov 27 18:58:34 EST 2012
kill -USR1 2381
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2381 killed at Tue Nov 27 18:58:34 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:58:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2438 >/dev/null 2>/dev/null
selfserv with PID 2438 found at Tue Nov 27 18:58:34 EST 2012
selfserv with PID 2438 started at Tue Nov 27 18:58:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1862: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2438 at Tue Nov 27 18:58:34 EST 2012
kill -USR1 2438
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2438 killed at Tue Nov 27 18:58:34 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2495 >/dev/null 2>/dev/null
selfserv with PID 2495 found at Tue Nov 27 18:58:34 EST 2012
selfserv with PID 2495 started at Tue Nov 27 18:58:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1863: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2495 at Tue Nov 27 18:58:35 EST 2012
kill -USR1 2495
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2495 killed at Tue Nov 27 18:58:35 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:58:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2552 >/dev/null 2>/dev/null
selfserv with PID 2552 found at Tue Nov 27 18:58:35 EST 2012
selfserv with PID 2552 started at Tue Nov 27 18:58:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1864: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2552 at Tue Nov 27 18:58:35 EST 2012
kill -USR1 2552
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2552 killed at Tue Nov 27 18:58:35 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2609 >/dev/null 2>/dev/null
selfserv with PID 2609 found at Tue Nov 27 18:58:35 EST 2012
selfserv with PID 2609 started at Tue Nov 27 18:58:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1865: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2609 at Tue Nov 27 18:58:35 EST 2012
kill -USR1 2609
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2609 killed at Tue Nov 27 18:58:35 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:58:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2666 >/dev/null 2>/dev/null
selfserv with PID 2666 found at Tue Nov 27 18:58:35 EST 2012
selfserv with PID 2666 started at Tue Nov 27 18:58:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1866: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2666 at Tue Nov 27 18:58:35 EST 2012
kill -USR1 2666
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2666 killed at Tue Nov 27 18:58:35 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2724 >/dev/null 2>/dev/null
selfserv with PID 2724 found at Tue Nov 27 18:58:35 EST 2012
selfserv with PID 2724 started at Tue Nov 27 18:58:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1867: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2724 at Tue Nov 27 18:58:36 EST 2012
kill -USR1 2724
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2724 killed at Tue Nov 27 18:58:36 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:58:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2781 >/dev/null 2>/dev/null
selfserv with PID 2781 found at Tue Nov 27 18:58:36 EST 2012
selfserv with PID 2781 started at Tue Nov 27 18:58:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1868: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2781 at Tue Nov 27 18:58:36 EST 2012
kill -USR1 2781
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2781 killed at Tue Nov 27 18:58:36 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2838 >/dev/null 2>/dev/null
selfserv with PID 2838 found at Tue Nov 27 18:58:36 EST 2012
selfserv with PID 2838 started at Tue Nov 27 18:58:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1869: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2838 at Tue Nov 27 18:58:36 EST 2012
kill -USR1 2838
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2838 killed at Tue Nov 27 18:58:36 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:58:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2895 >/dev/null 2>/dev/null
selfserv with PID 2895 found at Tue Nov 27 18:58:36 EST 2012
selfserv with PID 2895 started at Tue Nov 27 18:58:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1870: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2895 at Tue Nov 27 18:58:36 EST 2012
kill -USR1 2895
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2895 killed at Tue Nov 27 18:58:36 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2952 >/dev/null 2>/dev/null
selfserv with PID 2952 found at Tue Nov 27 18:58:36 EST 2012
selfserv with PID 2952 started at Tue Nov 27 18:58:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1871: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2952 at Tue Nov 27 18:58:36 EST 2012
kill -USR1 2952
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2952 killed at Tue Nov 27 18:58:36 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:58:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3009 >/dev/null 2>/dev/null
selfserv with PID 3009 found at Tue Nov 27 18:58:36 EST 2012
selfserv with PID 3009 started at Tue Nov 27 18:58:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1872: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3009 at Tue Nov 27 18:58:37 EST 2012
kill -USR1 3009
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3009 killed at Tue Nov 27 18:58:37 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3066 >/dev/null 2>/dev/null
selfserv with PID 3066 found at Tue Nov 27 18:58:37 EST 2012
selfserv with PID 3066 started at Tue Nov 27 18:58:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1873: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3066 at Tue Nov 27 18:58:37 EST 2012
kill -USR1 3066
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3066 killed at Tue Nov 27 18:58:37 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:58:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3123 >/dev/null 2>/dev/null
selfserv with PID 3123 found at Tue Nov 27 18:58:37 EST 2012
selfserv with PID 3123 started at Tue Nov 27 18:58:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1874: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3123 at Tue Nov 27 18:58:37 EST 2012
kill -USR1 3123
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3123 killed at Tue Nov 27 18:58:37 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3180 >/dev/null 2>/dev/null
selfserv with PID 3180 found at Tue Nov 27 18:58:37 EST 2012
selfserv with PID 3180 started at Tue Nov 27 18:58:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1875: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3180 at Tue Nov 27 18:58:37 EST 2012
kill -USR1 3180
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3180 killed at Tue Nov 27 18:58:37 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:58:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3237 >/dev/null 2>/dev/null
selfserv with PID 3237 found at Tue Nov 27 18:58:37 EST 2012
selfserv with PID 3237 started at Tue Nov 27 18:58:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1876: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3237 at Tue Nov 27 18:58:38 EST 2012
kill -USR1 3237
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3237 killed at Tue Nov 27 18:58:38 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3295 >/dev/null 2>/dev/null
selfserv with PID 3295 found at Tue Nov 27 18:58:38 EST 2012
selfserv with PID 3295 started at Tue Nov 27 18:58:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1877: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3295 at Tue Nov 27 18:58:38 EST 2012
kill -USR1 3295
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3295 killed at Tue Nov 27 18:58:38 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:58:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3352 >/dev/null 2>/dev/null
selfserv with PID 3352 found at Tue Nov 27 18:58:38 EST 2012
selfserv with PID 3352 started at Tue Nov 27 18:58:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1878: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3352 at Tue Nov 27 18:58:38 EST 2012
kill -USR1 3352
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3352 killed at Tue Nov 27 18:58:38 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:58:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3409 >/dev/null 2>/dev/null
selfserv with PID 3409 found at Tue Nov 27 18:58:38 EST 2012
selfserv with PID 3409 started at Tue Nov 27 18:58:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1879: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3409 at Tue Nov 27 18:58:38 EST 2012
kill -USR1 3409
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3409 killed at Tue Nov 27 18:58:38 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 18:58:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3487 >/dev/null 2>/dev/null
selfserv with PID 3487 found at Tue Nov 27 18:58:38 EST 2012
selfserv with PID 3487 started at Tue Nov 27 18:58:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1880: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3487 at Tue Nov 27 18:58:39 EST 2012
kill -USR1 3487
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3487 killed at Tue Nov 27 18:58:39 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 18:58:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3550 >/dev/null 2>/dev/null
selfserv with PID 3550 found at Tue Nov 27 18:58:39 EST 2012
selfserv with PID 3550 started at Tue Nov 27 18:58:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1881: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3550 at Tue Nov 27 18:58:39 EST 2012
kill -USR1 3550
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3550 killed at Tue Nov 27 18:58:39 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 18:58:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3613 >/dev/null 2>/dev/null
selfserv with PID 3613 found at Tue Nov 27 18:58:39 EST 2012
selfserv with PID 3613 started at Tue Nov 27 18:58:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #1882: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3613 at Tue Nov 27 18:58:39 EST 2012
kill -USR1 3613
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3613 killed at Tue Nov 27 18:58:39 EST 2012
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Tue Nov 27 18:58:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3676 >/dev/null 2>/dev/null
selfserv with PID 3676 found at Tue Nov 27 18:58:39 EST 2012
selfserv with PID 3676 started at Tue Nov 27 18:58:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1883: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3676 at Tue Nov 27 18:58:39 EST 2012
kill -USR1 3676
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3676 killed at Tue Nov 27 18:58:39 EST 2012
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Tue Nov 27 18:58:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3739 >/dev/null 2>/dev/null
selfserv with PID 3739 found at Tue Nov 27 18:58:39 EST 2012
selfserv with PID 3739 started at Tue Nov 27 18:58:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #1884: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3739 at Tue Nov 27 18:58:39 EST 2012
kill -USR1 3739
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3739 killed at Tue Nov 27 18:58:39 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 18:58:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3802 >/dev/null 2>/dev/null
selfserv with PID 3802 found at Tue Nov 27 18:58:39 EST 2012
selfserv with PID 3802 started at Tue Nov 27 18:58:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1885: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3802 at Tue Nov 27 18:58:40 EST 2012
kill -USR1 3802
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3802 killed at Tue Nov 27 18:58:40 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 18:58:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3865 >/dev/null 2>/dev/null
selfserv with PID 3865 found at Tue Nov 27 18:58:40 EST 2012
selfserv with PID 3865 started at Tue Nov 27 18:58:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1886: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3865 at Tue Nov 27 18:58:40 EST 2012
kill -USR1 3865
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3865 killed at Tue Nov 27 18:58:40 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Tue Nov 27 18:58:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3928 >/dev/null 2>/dev/null
selfserv with PID 3928 found at Tue Nov 27 18:58:40 EST 2012
selfserv with PID 3928 started at Tue Nov 27 18:58:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s).
tstclnt: exiting with return code 1
ssl.sh: #1887: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3928 at Tue Nov 27 18:58:40 EST 2012
kill -USR1 3928
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3928 killed at Tue Nov 27 18:58:40 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Tue Nov 27 18:58:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3991 >/dev/null 2>/dev/null
selfserv with PID 3991 found at Tue Nov 27 18:58:40 EST 2012
selfserv with PID 3991 started at Tue Nov 27 18:58:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #1888: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3991 at Tue Nov 27 18:58:40 EST 2012
kill -USR1 3991
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3991 killed at Tue Nov 27 18:58:40 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 18:58:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4054 >/dev/null 2>/dev/null
selfserv with PID 4054 found at Tue Nov 27 18:58:40 EST 2012
selfserv with PID 4054 started at Tue Nov 27 18:58:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #1889: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4054 at Tue Nov 27 18:58:41 EST 2012
kill -USR1 4054
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4054 killed at Tue Nov 27 18:58:41 EST 2012
ssl.sh: SSL Stress Test  - server bypass/client normal  - with ECC ===============================
ssl.sh: Stress SSL2 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 18:58:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4186 >/dev/null 2>/dev/null
selfserv with PID 4186 found at Tue Nov 27 18:58:41 EST 2012
selfserv with PID 4186 started at Tue Nov 27 18:58:41 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 1000 -C A \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:41 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: SSL2 - 1 server certificates tested.
strsclnt completed at Tue Nov 27 18:58:41 EST 2012
ssl.sh: #1890: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4186 at Tue Nov 27 18:58:41 EST 2012
kill -USR1 4186
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4186 killed at Tue Nov 27 18:58:41 EST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 18:58:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4262 >/dev/null 2>/dev/null
selfserv with PID 4262 found at Tue Nov 27 18:58:41 EST 2012
selfserv with PID 4262 started at Tue Nov 27 18:58:41 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 1000 -C c -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:41 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:58:41 EST 2012
ssl.sh: #1891: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4262 at Tue Nov 27 18:58:41 EST 2012
kill -USR1 4262
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4262 killed at Tue Nov 27 18:58:41 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 18:58:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4338 >/dev/null 2>/dev/null
selfserv with PID 4338 found at Tue Nov 27 18:58:42 EST 2012
selfserv with PID 4338 started at Tue Nov 27 18:58:42 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 1000 -C c \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:42 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:58:42 EST 2012
ssl.sh: #1892: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4338 at Tue Nov 27 18:58:42 EST 2012
kill -USR1 4338
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4338 killed at Tue Nov 27 18:58:42 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 18:58:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4415 >/dev/null 2>/dev/null
selfserv with PID 4415 found at Tue Nov 27 18:58:42 EST 2012
selfserv with PID 4415 started at Tue Nov 27 18:58:42 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 1000 -C c -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:42 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:58:42 EST 2012
ssl.sh: #1893: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4415 at Tue Nov 27 18:58:42 EST 2012
kill -USR1 4415
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4415 killed at Tue Nov 27 18:58:42 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 18:58:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4491 >/dev/null 2>/dev/null
selfserv with PID 4491 found at Tue Nov 27 18:58:42 EST 2012
selfserv with PID 4491 started at Tue Nov 27 18:58:42 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:42 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:58:43 EST 2012
ssl.sh: #1894: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4491 at Tue Nov 27 18:58:43 EST 2012
kill -USR1 4491
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4491 killed at Tue Nov 27 18:58:43 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 18:58:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4567 >/dev/null 2>/dev/null
selfserv with PID 4567 found at Tue Nov 27 18:58:43 EST 2012
selfserv with PID 4567 started at Tue Nov 27 18:58:43 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 1000 -C c -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:43 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:58:43 EST 2012
ssl.sh: #1895: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4567 at Tue Nov 27 18:58:43 EST 2012
kill -USR1 4567
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4567 killed at Tue Nov 27 18:58:43 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 18:58:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4643 >/dev/null 2>/dev/null
selfserv with PID 4643 found at Tue Nov 27 18:58:43 EST 2012
selfserv with PID 4643 started at Tue Nov 27 18:58:43 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 1000 -C c -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:43 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:58:44 EST 2012
ssl.sh: #1896: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4643 at Tue Nov 27 18:58:44 EST 2012
kill -USR1 4643
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4643 killed at Tue Nov 27 18:58:44 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 18:58:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4719 >/dev/null 2>/dev/null
selfserv with PID 4719 found at Tue Nov 27 18:58:44 EST 2012
selfserv with PID 4719 started at Tue Nov 27 18:58:44 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 1000 -C c -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:44 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:58:44 EST 2012
ssl.sh: #1897: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4719 at Tue Nov 27 18:58:44 EST 2012
kill -USR1 4719
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4719 killed at Tue Nov 27 18:58:44 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Tue Nov 27 18:58:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4801 >/dev/null 2>/dev/null
selfserv with PID 4801 found at Tue Nov 27 18:58:44 EST 2012
selfserv with PID 4801 started at Tue Nov 27 18:58:44 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:44 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:58:45 EST 2012
ssl.sh: #1898: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4801 at Tue Nov 27 18:58:45 EST 2012
kill -USR1 4801
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4801 killed at Tue Nov 27 18:58:45 EST 2012
ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:58:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4898 >/dev/null 2>/dev/null
selfserv with PID 4898 found at Tue Nov 27 18:58:45 EST 2012
selfserv with PID 4898 started at Tue Nov 27 18:58:45 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 100 -C A -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:45 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: SSL2 - 100 server certificates tested.
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:58:45 EST 2012
ssl.sh: #1899: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4898 at Tue Nov 27 18:58:45 EST 2012
kill -USR1 4898
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4898 killed at Tue Nov 27 18:58:45 EST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:58:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4974 >/dev/null 2>/dev/null
selfserv with PID 4974 found at Tue Nov 27 18:58:46 EST 2012
selfserv with PID 4974 started at Tue Nov 27 18:58:46 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:46 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:58:46 EST 2012
ssl.sh: #1900: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4974 at Tue Nov 27 18:58:46 EST 2012
kill -USR1 4974
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4974 killed at Tue Nov 27 18:58:46 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:58:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5049 >/dev/null 2>/dev/null
selfserv with PID 5049 found at Tue Nov 27 18:58:46 EST 2012
selfserv with PID 5049 started at Tue Nov 27 18:58:46 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 100 -C c -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:46 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:58:47 EST 2012
ssl.sh: #1901: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5049 at Tue Nov 27 18:58:47 EST 2012
kill -USR1 5049
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5049 killed at Tue Nov 27 18:58:47 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 18:58:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5124 >/dev/null 2>/dev/null
selfserv with PID 5124 found at Tue Nov 27 18:58:47 EST 2012
selfserv with PID 5124 started at Tue Nov 27 18:58:47 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:47 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 18:58:47 EST 2012
ssl.sh: #1902: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5124 at Tue Nov 27 18:58:47 EST 2012
kill -USR1 5124
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5124 killed at Tue Nov 27 18:58:47 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 18:58:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5200 >/dev/null 2>/dev/null
selfserv with PID 5200 found at Tue Nov 27 18:58:47 EST 2012
selfserv with PID 5200 started at Tue Nov 27 18:58:47 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:47 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:58:47 EST 2012
ssl.sh: #1903: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5200 at Tue Nov 27 18:58:47 EST 2012
kill -USR1 5200
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5200 killed at Tue Nov 27 18:58:47 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 18:58:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5276 >/dev/null 2>/dev/null
selfserv with PID 5276 found at Tue Nov 27 18:58:47 EST 2012
selfserv with PID 5276 started at Tue Nov 27 18:58:47 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:47 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:58:48 EST 2012
ssl.sh: #1904: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5276 at Tue Nov 27 18:58:48 EST 2012
kill -USR1 5276
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5276 killed at Tue Nov 27 18:58:48 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 18:58:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5353 >/dev/null 2>/dev/null
selfserv with PID 5353 found at Tue Nov 27 18:58:48 EST 2012
selfserv with PID 5353 started at Tue Nov 27 18:58:48 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:48 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 18:58:48 EST 2012
ssl.sh: #1905: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5353 at Tue Nov 27 18:58:48 EST 2012
kill -USR1 5353
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5353 killed at Tue Nov 27 18:58:48 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 18:58:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5429 >/dev/null 2>/dev/null
selfserv with PID 5429 found at Tue Nov 27 18:58:48 EST 2012
selfserv with PID 5429 started at Tue Nov 27 18:58:48 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:48 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 18:58:48 EST 2012
ssl.sh: #1906: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5429 at Tue Nov 27 18:58:48 EST 2012
kill -USR1 5429
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5429 killed at Tue Nov 27 18:58:48 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Tue Nov 27 18:58:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5511 >/dev/null 2>/dev/null
selfserv with PID 5511 found at Tue Nov 27 18:58:48 EST 2012
selfserv with PID 5511 started at Tue Nov 27 18:58:48 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:48 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:58:49 EST 2012
ssl.sh: #1907: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5511 at Tue Nov 27 18:58:49 EST 2012
kill -USR1 5511
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5511 killed at Tue Nov 27 18:58:49 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Tue Nov 27 18:58:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -k buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5593 >/dev/null 2>/dev/null
selfserv with PID 5593 found at Tue Nov 27 18:58:49 EST 2012
selfserv with PID 5593 started at Tue Nov 27 18:58:49 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u -a buildnss02-sni.usersys.redhat.com \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:49 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:58:49 EST 2012
ssl.sh: #1908: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5593 at Tue Nov 27 18:58:49 EST 2012
kill -USR1 5593
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5593 killed at Tue Nov 27 18:58:49 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 18:58:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5690 >/dev/null 2>/dev/null
selfserv with PID 5690 found at Tue Nov 27 18:58:49 EST 2012
selfserv with PID 5690 started at Tue Nov 27 18:58:49 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 100 -C :C009 -N -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:49 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:58:50 EST 2012
ssl.sh: #1909: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5690 at Tue Nov 27 18:58:50 EST 2012
kill -USR1 5690
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5690 killed at Tue Nov 27 18:58:50 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 18:58:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5765 >/dev/null 2>/dev/null
selfserv with PID 5765 found at Tue Nov 27 18:58:50 EST 2012
selfserv with PID 5765 started at Tue Nov 27 18:58:50 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 1000 -C :C013 -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:50 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:58:51 EST 2012
ssl.sh: #1910: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5765 at Tue Nov 27 18:58:51 EST 2012
kill -USR1 5765
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5765 killed at Tue Nov 27 18:58:51 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 18:58:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5841 >/dev/null 2>/dev/null
selfserv with PID 5841 found at Tue Nov 27 18:58:51 EST 2012
selfserv with PID 5841 started at Tue Nov 27 18:58:51 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 100 -C :C004 -N \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:51 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:58:52 EST 2012
ssl.sh: #1911: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5841 at Tue Nov 27 18:58:52 EST 2012
kill -USR1 5841
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5841 killed at Tue Nov 27 18:58:52 EST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 18:58:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5916 >/dev/null 2>/dev/null
selfserv with PID 5916 found at Tue Nov 27 18:58:52 EST 2012
selfserv with PID 5916 started at Tue Nov 27 18:58:52 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 100 -C :C00E -N \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:52 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:58:53 EST 2012
ssl.sh: #1912: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5916 at Tue Nov 27 18:58:53 EST 2012
kill -USR1 5916
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5916 killed at Tue Nov 27 18:58:53 EST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 18:58:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5991 >/dev/null 2>/dev/null
selfserv with PID 5991 found at Tue Nov 27 18:58:53 EST 2012
selfserv with PID 5991 started at Tue Nov 27 18:58:53 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 1000 -C :C013 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:53 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:58:53 EST 2012
ssl.sh: #1913: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5991 at Tue Nov 27 18:58:53 EST 2012
kill -USR1 5991
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5991 killed at Tue Nov 27 18:58:53 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 18:58:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6067 >/dev/null 2>/dev/null
selfserv with PID 6067 found at Tue Nov 27 18:58:53 EST 2012
selfserv with PID 6067 started at Tue Nov 27 18:58:53 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 1000 -C :C004 -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:53 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:58:54 EST 2012
ssl.sh: #1914: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6067 at Tue Nov 27 18:58:54 EST 2012
kill -USR1 6067
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6067 killed at Tue Nov 27 18:58:54 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:58:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6165 >/dev/null 2>/dev/null
selfserv with PID 6165 found at Tue Nov 27 18:58:54 EST 2012
selfserv with PID 6165 started at Tue Nov 27 18:58:54 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 18:58:54 EST 2012
ssl.sh: #1915: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6165 at Tue Nov 27 18:58:54 EST 2012
kill -USR1 6165
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6165 killed at Tue Nov 27 18:58:54 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 18:58:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6240 >/dev/null 2>/dev/null
selfserv with PID 6240 found at Tue Nov 27 18:58:54 EST 2012
selfserv with PID 6240 started at Tue Nov 27 18:58:54 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:58:54 EST 2012
ssl.sh: #1916: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6240 at Tue Nov 27 18:58:54 EST 2012
kill -USR1 6240
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6240 killed at Tue Nov 27 18:58:54 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:58:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6316 >/dev/null 2>/dev/null
selfserv with PID 6316 found at Tue Nov 27 18:58:54 EST 2012
selfserv with PID 6316 started at Tue Nov 27 18:58:54 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 10 -C :C004 -N -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 18:58:55 EST 2012
ssl.sh: #1917: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6316 at Tue Nov 27 18:58:55 EST 2012
kill -USR1 6316
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6316 killed at Tue Nov 27 18:58:55 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:58:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6391 >/dev/null 2>/dev/null
selfserv with PID 6391 found at Tue Nov 27 18:58:55 EST 2012
selfserv with PID 6391 started at Tue Nov 27 18:58:55 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:55 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 18:58:55 EST 2012
ssl.sh: #1918: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6391 at Tue Nov 27 18:58:55 EST 2012
kill -USR1 6391
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6391 killed at Tue Nov 27 18:58:55 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 18:58:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6466 >/dev/null 2>/dev/null
selfserv with PID 6466 found at Tue Nov 27 18:58:55 EST 2012
selfserv with PID 6466 started at Tue Nov 27 18:58:55 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 100 -C :C013 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:55 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:58:55 EST 2012
ssl.sh: #1919: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6466 at Tue Nov 27 18:58:55 EST 2012
kill -USR1 6466
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6466 killed at Tue Nov 27 18:58:55 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 18:58:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6542 >/dev/null 2>/dev/null
selfserv with PID 6542 found at Tue Nov 27 18:58:55 EST 2012
selfserv with PID 6542 started at Tue Nov 27 18:58:55 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:58:55 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 18:58:56 EST 2012
ssl.sh: #1920: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6542 at Tue Nov 27 18:58:56 EST 2012
kill -USR1 6542
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6542 killed at Tue Nov 27 18:58:56 EST 2012
ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client normal  - with ECC ===============================
selfserv starting at Tue Nov 27 18:58:56 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:58:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:56 EST 2012
selfserv with PID 6605 started at Tue Nov 27 18:58:56 EST 2012
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1921: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1922: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1923: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1924: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1925: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1926: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1927: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1928: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1929: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1930: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1931: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1932: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1933: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1934: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1935: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1936: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1937: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1938: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1939: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1940: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1941: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1942: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1943: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1944: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1945: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1946: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1947: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1948: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1949: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1950: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1951: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1952: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1953: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1954: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1955: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1956: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1957: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1958: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1959: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1960: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1961: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1962: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1963: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1964: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1965: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1966: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1967: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1968: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1969: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 6605 >/dev/null 2>/dev/null
selfserv with PID 6605 found at Tue Nov 27 18:58:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1970: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 6605 at Tue Nov 27 18:59:00 EST 2012
kill -USR1 6605
selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6605 killed at Tue Nov 27 18:59:00 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:59:00 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8024 >/dev/null 2>/dev/null
selfserv with PID 8024 found at Tue Nov 27 18:59:00 EST 2012
selfserv with PID 8024 started at Tue Nov 27 18:59:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1971: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8024 >/dev/null 2>/dev/null
selfserv with PID 8024 found at Tue Nov 27 18:59:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1972: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8024 >/dev/null 2>/dev/null
selfserv with PID 8024 found at Tue Nov 27 18:59:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1973: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8024 >/dev/null 2>/dev/null
selfserv with PID 8024 found at Tue Nov 27 18:59:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1974: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8024 >/dev/null 2>/dev/null
selfserv with PID 8024 found at Tue Nov 27 18:59:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1975: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 8024 at Tue Nov 27 18:59:00 EST 2012
kill -USR1 8024
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8024 killed at Tue Nov 27 18:59:00 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:59:00 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:00 EST 2012
selfserv with PID 8172 started at Tue Nov 27 18:59:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1976: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1977: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1978: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1979: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1980: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1981: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1982: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1983: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1984: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1985: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1986: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1987: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1988: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1989: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8172 >/dev/null 2>/dev/null
selfserv with PID 8172 found at Tue Nov 27 18:59:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1990: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 8172 at Tue Nov 27 18:59:02 EST 2012
kill -USR1 8172
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8172 killed at Tue Nov 27 18:59:02 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:59:02 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8571 >/dev/null 2>/dev/null
selfserv with PID 8571 found at Tue Nov 27 18:59:02 EST 2012
selfserv with PID 8571 started at Tue Nov 27 18:59:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1991: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8571 >/dev/null 2>/dev/null
selfserv with PID 8571 found at Tue Nov 27 18:59:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1992: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8571 >/dev/null 2>/dev/null
selfserv with PID 8571 found at Tue Nov 27 18:59:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1993: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8571 >/dev/null 2>/dev/null
selfserv with PID 8571 found at Tue Nov 27 18:59:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1994: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8571 >/dev/null 2>/dev/null
selfserv with PID 8571 found at Tue Nov 27 18:59:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1995: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 8571 at Tue Nov 27 18:59:02 EST 2012
kill -USR1 8571
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8571 killed at Tue Nov 27 18:59:02 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:59:02 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:02 EST 2012
selfserv with PID 8719 started at Tue Nov 27 18:59:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1996: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1997: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1998: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1999: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2000: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2001: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2002: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2003: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2004: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2005: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2006: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2007: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2008: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2009: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8719 >/dev/null 2>/dev/null
selfserv with PID 8719 found at Tue Nov 27 18:59:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2010: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 8719 at Tue Nov 27 18:59:04 EST 2012
kill -USR1 8719
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8719 killed at Tue Nov 27 18:59:04 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:59:04 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9104 >/dev/null 2>/dev/null
selfserv with PID 9104 found at Tue Nov 27 18:59:04 EST 2012
selfserv with PID 9104 started at Tue Nov 27 18:59:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2011: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 9104 >/dev/null 2>/dev/null
selfserv with PID 9104 found at Tue Nov 27 18:59:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2012: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9104 >/dev/null 2>/dev/null
selfserv with PID 9104 found at Tue Nov 27 18:59:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2013: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 9104 >/dev/null 2>/dev/null
selfserv with PID 9104 found at Tue Nov 27 18:59:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2014: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 9104 >/dev/null 2>/dev/null
selfserv with PID 9104 found at Tue Nov 27 18:59:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2015: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 9104 at Tue Nov 27 18:59:04 EST 2012
kill -USR1 9104
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9104 killed at Tue Nov 27 18:59:04 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:59:04 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9252 >/dev/null 2>/dev/null
selfserv with PID 9252 found at Tue Nov 27 18:59:04 EST 2012
selfserv with PID 9252 started at Tue Nov 27 18:59:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2016: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 9252 >/dev/null 2>/dev/null
selfserv with PID 9252 found at Tue Nov 27 18:59:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2017: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9252 >/dev/null 2>/dev/null
selfserv with PID 9252 found at Tue Nov 27 18:59:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2018: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 9252 >/dev/null 2>/dev/null
selfserv with PID 9252 found at Tue Nov 27 18:59:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2019: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 9252 >/dev/null 2>/dev/null
selfserv with PID 9252 found at Tue Nov 27 18:59:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2020: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9252 at Tue Nov 27 18:59:05 EST 2012
kill -USR1 9252
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9252 killed at Tue Nov 27 18:59:05 EST 2012
ssl.sh: SSL Client Authentication Extended Test - server bypass/client normal  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:05 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9451 >/dev/null 2>/dev/null
selfserv with PID 9451 found at Tue Nov 27 18:59:05 EST 2012
selfserv with PID 9451 started at Tue Nov 27 18:59:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2021: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9451 at Tue Nov 27 18:59:05 EST 2012
kill -USR1 9451
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9451 killed at Tue Nov 27 18:59:05 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:59:05 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9508 >/dev/null 2>/dev/null
selfserv with PID 9508 found at Tue Nov 27 18:59:05 EST 2012
selfserv with PID 9508 started at Tue Nov 27 18:59:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2022: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9508 at Tue Nov 27 18:59:05 EST 2012
kill -USR1 9508
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9508 killed at Tue Nov 27 18:59:05 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:59:05 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9565 >/dev/null 2>/dev/null
selfserv with PID 9565 found at Tue Nov 27 18:59:05 EST 2012
selfserv with PID 9565 started at Tue Nov 27 18:59:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2023: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9565 at Tue Nov 27 18:59:06 EST 2012
kill -USR1 9565
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9565 killed at Tue Nov 27 18:59:06 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:06 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9622 >/dev/null 2>/dev/null
selfserv with PID 9622 found at Tue Nov 27 18:59:06 EST 2012
selfserv with PID 9622 started at Tue Nov 27 18:59:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2024: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9622 at Tue Nov 27 18:59:06 EST 2012
kill -USR1 9622
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9622 killed at Tue Nov 27 18:59:06 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:59:06 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9679 >/dev/null 2>/dev/null
selfserv with PID 9679 found at Tue Nov 27 18:59:06 EST 2012
selfserv with PID 9679 started at Tue Nov 27 18:59:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2025: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9679 at Tue Nov 27 18:59:06 EST 2012
kill -USR1 9679
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9679 killed at Tue Nov 27 18:59:06 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:59:06 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9736 >/dev/null 2>/dev/null
selfserv with PID 9736 found at Tue Nov 27 18:59:06 EST 2012
selfserv with PID 9736 started at Tue Nov 27 18:59:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2026: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9736 at Tue Nov 27 18:59:06 EST 2012
kill -USR1 9736
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9736 killed at Tue Nov 27 18:59:06 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:06 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9793 >/dev/null 2>/dev/null
selfserv with PID 9793 found at Tue Nov 27 18:59:06 EST 2012
selfserv with PID 9793 started at Tue Nov 27 18:59:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2027: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9793 at Tue Nov 27 18:59:06 EST 2012
kill -USR1 9793
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9793 killed at Tue Nov 27 18:59:06 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:59:07 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9850 >/dev/null 2>/dev/null
selfserv with PID 9850 found at Tue Nov 27 18:59:07 EST 2012
selfserv with PID 9850 started at Tue Nov 27 18:59:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2028: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9850 at Tue Nov 27 18:59:07 EST 2012
kill -USR1 9850
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9850 killed at Tue Nov 27 18:59:07 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:59:07 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9907 >/dev/null 2>/dev/null
selfserv with PID 9907 found at Tue Nov 27 18:59:07 EST 2012
selfserv with PID 9907 started at Tue Nov 27 18:59:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2029: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9907 at Tue Nov 27 18:59:07 EST 2012
kill -USR1 9907
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9907 killed at Tue Nov 27 18:59:07 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:07 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9964 >/dev/null 2>/dev/null
selfserv with PID 9964 found at Tue Nov 27 18:59:07 EST 2012
selfserv with PID 9964 started at Tue Nov 27 18:59:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2030: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9964 at Tue Nov 27 18:59:07 EST 2012
kill -USR1 9964
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9964 killed at Tue Nov 27 18:59:07 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:59:07 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10021 >/dev/null 2>/dev/null
selfserv with PID 10021 found at Tue Nov 27 18:59:07 EST 2012
selfserv with PID 10021 started at Tue Nov 27 18:59:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2031: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10021 at Tue Nov 27 18:59:07 EST 2012
kill -USR1 10021
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10021 killed at Tue Nov 27 18:59:07 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:59:07 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10078 >/dev/null 2>/dev/null
selfserv with PID 10078 found at Tue Nov 27 18:59:07 EST 2012
selfserv with PID 10078 started at Tue Nov 27 18:59:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2032: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10078 at Tue Nov 27 18:59:08 EST 2012
kill -USR1 10078
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10078 killed at Tue Nov 27 18:59:08 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:08 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10135 >/dev/null 2>/dev/null
selfserv with PID 10135 found at Tue Nov 27 18:59:08 EST 2012
selfserv with PID 10135 started at Tue Nov 27 18:59:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2033: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10135 at Tue Nov 27 18:59:08 EST 2012
kill -USR1 10135
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10135 killed at Tue Nov 27 18:59:08 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:59:08 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10192 >/dev/null 2>/dev/null
selfserv with PID 10192 found at Tue Nov 27 18:59:08 EST 2012
selfserv with PID 10192 started at Tue Nov 27 18:59:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2034: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10192 at Tue Nov 27 18:59:08 EST 2012
kill -USR1 10192
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10192 killed at Tue Nov 27 18:59:08 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:59:08 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10249 >/dev/null 2>/dev/null
selfserv with PID 10249 found at Tue Nov 27 18:59:08 EST 2012
selfserv with PID 10249 started at Tue Nov 27 18:59:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2035: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10249 at Tue Nov 27 18:59:08 EST 2012
kill -USR1 10249
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10249 killed at Tue Nov 27 18:59:08 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:08 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10306 >/dev/null 2>/dev/null
selfserv with PID 10306 found at Tue Nov 27 18:59:08 EST 2012
selfserv with PID 10306 started at Tue Nov 27 18:59:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2036: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10306 at Tue Nov 27 18:59:08 EST 2012
kill -USR1 10306
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10306 killed at Tue Nov 27 18:59:08 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:59:08 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10363 >/dev/null 2>/dev/null
selfserv with PID 10363 found at Tue Nov 27 18:59:08 EST 2012
selfserv with PID 10363 started at Tue Nov 27 18:59:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2037: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10363 at Tue Nov 27 18:59:09 EST 2012
kill -USR1 10363
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10363 killed at Tue Nov 27 18:59:09 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:59:09 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10420 >/dev/null 2>/dev/null
selfserv with PID 10420 found at Tue Nov 27 18:59:09 EST 2012
selfserv with PID 10420 started at Tue Nov 27 18:59:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2038: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10420 at Tue Nov 27 18:59:09 EST 2012
kill -USR1 10420
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10420 killed at Tue Nov 27 18:59:09 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:09 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10477 >/dev/null 2>/dev/null
selfserv with PID 10477 found at Tue Nov 27 18:59:09 EST 2012
selfserv with PID 10477 started at Tue Nov 27 18:59:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2039: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10477 at Tue Nov 27 18:59:09 EST 2012
kill -USR1 10477
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10477 killed at Tue Nov 27 18:59:09 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:59:09 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10534 >/dev/null 2>/dev/null
selfserv with PID 10534 found at Tue Nov 27 18:59:09 EST 2012
selfserv with PID 10534 started at Tue Nov 27 18:59:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2040: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10534 at Tue Nov 27 18:59:09 EST 2012
kill -USR1 10534
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10534 killed at Tue Nov 27 18:59:09 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:59:09 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10592 >/dev/null 2>/dev/null
selfserv with PID 10592 found at Tue Nov 27 18:59:09 EST 2012
selfserv with PID 10592 started at Tue Nov 27 18:59:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2041: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10592 at Tue Nov 27 18:59:10 EST 2012
kill -USR1 10592
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10592 killed at Tue Nov 27 18:59:10 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:10 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10649 >/dev/null 2>/dev/null
selfserv with PID 10649 found at Tue Nov 27 18:59:10 EST 2012
selfserv with PID 10649 started at Tue Nov 27 18:59:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2042: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10649 at Tue Nov 27 18:59:10 EST 2012
kill -USR1 10649
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10649 killed at Tue Nov 27 18:59:10 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:59:10 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10706 >/dev/null 2>/dev/null
selfserv with PID 10706 found at Tue Nov 27 18:59:10 EST 2012
selfserv with PID 10706 started at Tue Nov 27 18:59:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2043: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10706 at Tue Nov 27 18:59:10 EST 2012
kill -USR1 10706
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10706 killed at Tue Nov 27 18:59:10 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:59:10 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10763 >/dev/null 2>/dev/null
selfserv with PID 10763 found at Tue Nov 27 18:59:10 EST 2012
selfserv with PID 10763 started at Tue Nov 27 18:59:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2044: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10763 at Tue Nov 27 18:59:10 EST 2012
kill -USR1 10763
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10763 killed at Tue Nov 27 18:59:10 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:10 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10820 >/dev/null 2>/dev/null
selfserv with PID 10820 found at Tue Nov 27 18:59:10 EST 2012
selfserv with PID 10820 started at Tue Nov 27 18:59:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2045: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10820 at Tue Nov 27 18:59:10 EST 2012
kill -USR1 10820
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10820 killed at Tue Nov 27 18:59:10 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:59:10 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10877 >/dev/null 2>/dev/null
selfserv with PID 10877 found at Tue Nov 27 18:59:10 EST 2012
selfserv with PID 10877 started at Tue Nov 27 18:59:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2046: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10877 at Tue Nov 27 18:59:11 EST 2012
kill -USR1 10877
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10877 killed at Tue Nov 27 18:59:11 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:59:11 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10934 >/dev/null 2>/dev/null
selfserv with PID 10934 found at Tue Nov 27 18:59:11 EST 2012
selfserv with PID 10934 started at Tue Nov 27 18:59:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2047: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10934 at Tue Nov 27 18:59:11 EST 2012
kill -USR1 10934
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10934 killed at Tue Nov 27 18:59:11 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:11 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10992 >/dev/null 2>/dev/null
selfserv with PID 10992 found at Tue Nov 27 18:59:11 EST 2012
selfserv with PID 10992 started at Tue Nov 27 18:59:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2048: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10992 at Tue Nov 27 18:59:11 EST 2012
kill -USR1 10992
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10992 killed at Tue Nov 27 18:59:11 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:59:11 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11049 >/dev/null 2>/dev/null
selfserv with PID 11049 found at Tue Nov 27 18:59:11 EST 2012
selfserv with PID 11049 started at Tue Nov 27 18:59:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2049: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11049 at Tue Nov 27 18:59:11 EST 2012
kill -USR1 11049
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11049 killed at Tue Nov 27 18:59:11 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:59:11 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11106 >/dev/null 2>/dev/null
selfserv with PID 11106 found at Tue Nov 27 18:59:11 EST 2012
selfserv with PID 11106 started at Tue Nov 27 18:59:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2050: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11106 at Tue Nov 27 18:59:12 EST 2012
kill -USR1 11106
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11106 killed at Tue Nov 27 18:59:12 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:12 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11178 >/dev/null 2>/dev/null
selfserv with PID 11178 found at Tue Nov 27 18:59:12 EST 2012
selfserv with PID 11178 started at Tue Nov 27 18:59:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2051: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11178 at Tue Nov 27 18:59:12 EST 2012
kill -USR1 11178
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11178 killed at Tue Nov 27 18:59:12 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:12 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11235 >/dev/null 2>/dev/null
selfserv with PID 11235 found at Tue Nov 27 18:59:12 EST 2012
selfserv with PID 11235 started at Tue Nov 27 18:59:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2052: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11235 at Tue Nov 27 18:59:12 EST 2012
kill -USR1 11235
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11235 killed at Tue Nov 27 18:59:12 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:12 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11292 >/dev/null 2>/dev/null
selfserv with PID 11292 found at Tue Nov 27 18:59:12 EST 2012
selfserv with PID 11292 started at Tue Nov 27 18:59:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2053: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11292 at Tue Nov 27 18:59:12 EST 2012
kill -USR1 11292
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11292 killed at Tue Nov 27 18:59:12 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:12 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11349 >/dev/null 2>/dev/null
selfserv with PID 11349 found at Tue Nov 27 18:59:12 EST 2012
selfserv with PID 11349 started at Tue Nov 27 18:59:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2054: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11349 at Tue Nov 27 18:59:12 EST 2012
kill -USR1 11349
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11349 killed at Tue Nov 27 18:59:13 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:13 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11406 >/dev/null 2>/dev/null
selfserv with PID 11406 found at Tue Nov 27 18:59:13 EST 2012
selfserv with PID 11406 started at Tue Nov 27 18:59:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2055: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11406 at Tue Nov 27 18:59:13 EST 2012
kill -USR1 11406
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11406 killed at Tue Nov 27 18:59:13 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:13 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11463 >/dev/null 2>/dev/null
selfserv with PID 11463 found at Tue Nov 27 18:59:13 EST 2012
selfserv with PID 11463 started at Tue Nov 27 18:59:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2056: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11463 at Tue Nov 27 18:59:13 EST 2012
kill -USR1 11463
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11463 killed at Tue Nov 27 18:59:13 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:13 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11520 >/dev/null 2>/dev/null
selfserv with PID 11520 found at Tue Nov 27 18:59:13 EST 2012
selfserv with PID 11520 started at Tue Nov 27 18:59:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2057: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11520 at Tue Nov 27 18:59:13 EST 2012
kill -USR1 11520
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11520 killed at Tue Nov 27 18:59:13 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:13 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11577 >/dev/null 2>/dev/null
selfserv with PID 11577 found at Tue Nov 27 18:59:13 EST 2012
selfserv with PID 11577 started at Tue Nov 27 18:59:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2058: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11577 at Tue Nov 27 18:59:13 EST 2012
kill -USR1 11577
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11577 killed at Tue Nov 27 18:59:14 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:14 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11636 >/dev/null 2>/dev/null
selfserv with PID 11636 found at Tue Nov 27 18:59:14 EST 2012
selfserv with PID 11636 started at Tue Nov 27 18:59:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2059: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11636 at Tue Nov 27 18:59:14 EST 2012
kill -USR1 11636
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11636 killed at Tue Nov 27 18:59:14 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:14 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11693 >/dev/null 2>/dev/null
selfserv with PID 11693 found at Tue Nov 27 18:59:14 EST 2012
selfserv with PID 11693 started at Tue Nov 27 18:59:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2060: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11693 at Tue Nov 27 18:59:14 EST 2012
kill -USR1 11693
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11693 killed at Tue Nov 27 18:59:14 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:14 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11752 >/dev/null 2>/dev/null
selfserv with PID 11752 found at Tue Nov 27 18:59:14 EST 2012
selfserv with PID 11752 started at Tue Nov 27 18:59:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2061: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11752 at Tue Nov 27 18:59:14 EST 2012
kill -USR1 11752
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11752 killed at Tue Nov 27 18:59:14 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:14 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11809 >/dev/null 2>/dev/null
selfserv with PID 11809 found at Tue Nov 27 18:59:14 EST 2012
selfserv with PID 11809 started at Tue Nov 27 18:59:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2062: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11809 at Tue Nov 27 18:59:14 EST 2012
kill -USR1 11809
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11809 killed at Tue Nov 27 18:59:14 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:15 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11867 >/dev/null 2>/dev/null
selfserv with PID 11867 found at Tue Nov 27 18:59:15 EST 2012
selfserv with PID 11867 started at Tue Nov 27 18:59:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2063: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11867 at Tue Nov 27 18:59:15 EST 2012
kill -USR1 11867
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11867 killed at Tue Nov 27 18:59:15 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:15 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11924 >/dev/null 2>/dev/null
selfserv with PID 11924 found at Tue Nov 27 18:59:15 EST 2012
selfserv with PID 11924 started at Tue Nov 27 18:59:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2064: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11924 at Tue Nov 27 18:59:15 EST 2012
kill -USR1 11924
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11924 killed at Tue Nov 27 18:59:15 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:15 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11981 >/dev/null 2>/dev/null
selfserv with PID 11981 found at Tue Nov 27 18:59:15 EST 2012
selfserv with PID 11981 started at Tue Nov 27 18:59:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2065: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11981 at Tue Nov 27 18:59:15 EST 2012
kill -USR1 11981
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11981 killed at Tue Nov 27 18:59:15 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:15 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12038 >/dev/null 2>/dev/null
selfserv with PID 12038 found at Tue Nov 27 18:59:15 EST 2012
selfserv with PID 12038 started at Tue Nov 27 18:59:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2066: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12038 at Tue Nov 27 18:59:16 EST 2012
kill -USR1 12038
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12038 killed at Tue Nov 27 18:59:16 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:16 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12095 >/dev/null 2>/dev/null
selfserv with PID 12095 found at Tue Nov 27 18:59:16 EST 2012
selfserv with PID 12095 started at Tue Nov 27 18:59:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2067: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12095 at Tue Nov 27 18:59:16 EST 2012
kill -USR1 12095
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12095 killed at Tue Nov 27 18:59:16 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:16 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12152 >/dev/null 2>/dev/null
selfserv with PID 12152 found at Tue Nov 27 18:59:16 EST 2012
selfserv with PID 12152 started at Tue Nov 27 18:59:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2068: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12152 at Tue Nov 27 18:59:16 EST 2012
kill -USR1 12152
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12152 killed at Tue Nov 27 18:59:16 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:16 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12209 >/dev/null 2>/dev/null
selfserv with PID 12209 found at Tue Nov 27 18:59:16 EST 2012
selfserv with PID 12209 started at Tue Nov 27 18:59:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2069: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12209 at Tue Nov 27 18:59:16 EST 2012
kill -USR1 12209
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12209 killed at Tue Nov 27 18:59:16 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:16 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12266 >/dev/null 2>/dev/null
selfserv with PID 12266 found at Tue Nov 27 18:59:16 EST 2012
selfserv with PID 12266 started at Tue Nov 27 18:59:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2070: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12266 at Tue Nov 27 18:59:16 EST 2012
kill -USR1 12266
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12266 killed at Tue Nov 27 18:59:17 EST 2012
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: SSL Stress Test Extended Test - server bypass/client normal  - with ECC ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 18:59:17 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12441 >/dev/null 2>/dev/null
selfserv with PID 12441 found at Tue Nov 27 18:59:17 EST 2012
selfserv with PID 12441 started at Tue Nov 27 18:59:17 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 1000 -C c -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:17 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:17 EST 2012
ssl.sh: #2071: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12441 at Tue Nov 27 18:59:17 EST 2012
kill -USR1 12441
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12441 killed at Tue Nov 27 18:59:17 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 18:59:17 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12517 >/dev/null 2>/dev/null
selfserv with PID 12517 found at Tue Nov 27 18:59:17 EST 2012
selfserv with PID 12517 started at Tue Nov 27 18:59:17 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 1000 -C c \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:17 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:17 EST 2012
ssl.sh: #2072: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12517 at Tue Nov 27 18:59:18 EST 2012
kill -USR1 12517
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12517 killed at Tue Nov 27 18:59:18 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 18:59:18 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12593 >/dev/null 2>/dev/null
selfserv with PID 12593 found at Tue Nov 27 18:59:18 EST 2012
selfserv with PID 12593 started at Tue Nov 27 18:59:18 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 1000 -C c -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:18 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:18 EST 2012
ssl.sh: #2073: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12593 at Tue Nov 27 18:59:18 EST 2012
kill -USR1 12593
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12593 killed at Tue Nov 27 18:59:18 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 18:59:18 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12669 >/dev/null 2>/dev/null
selfserv with PID 12669 found at Tue Nov 27 18:59:18 EST 2012
selfserv with PID 12669 started at Tue Nov 27 18:59:18 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:18 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:59:18 EST 2012
ssl.sh: #2074: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12669 at Tue Nov 27 18:59:18 EST 2012
kill -USR1 12669
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12669 killed at Tue Nov 27 18:59:18 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 18:59:18 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12745 >/dev/null 2>/dev/null
selfserv with PID 12745 found at Tue Nov 27 18:59:18 EST 2012
selfserv with PID 12745 started at Tue Nov 27 18:59:18 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:18 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:19 EST 2012
ssl.sh: #2075: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12745 at Tue Nov 27 18:59:19 EST 2012
kill -USR1 12745
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12745 killed at Tue Nov 27 18:59:19 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 18:59:19 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12821 >/dev/null 2>/dev/null
selfserv with PID 12821 found at Tue Nov 27 18:59:19 EST 2012
selfserv with PID 12821 started at Tue Nov 27 18:59:19 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:19 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:59:19 EST 2012
ssl.sh: #2076: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12821 at Tue Nov 27 18:59:19 EST 2012
kill -USR1 12821
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12821 killed at Tue Nov 27 18:59:19 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 18:59:19 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12897 >/dev/null 2>/dev/null
selfserv with PID 12897 found at Tue Nov 27 18:59:19 EST 2012
selfserv with PID 12897 started at Tue Nov 27 18:59:19 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:19 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:59:20 EST 2012
ssl.sh: #2077: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12897 at Tue Nov 27 18:59:20 EST 2012
kill -USR1 12897
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12897 killed at Tue Nov 27 18:59:20 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:59:20 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13002 >/dev/null 2>/dev/null
selfserv with PID 13002 found at Tue Nov 27 18:59:20 EST 2012
selfserv with PID 13002 started at Tue Nov 27 18:59:20 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:20 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:59:21 EST 2012
ssl.sh: #2078: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13002 at Tue Nov 27 18:59:21 EST 2012
kill -USR1 13002
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13002 killed at Tue Nov 27 18:59:21 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:59:21 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13077 >/dev/null 2>/dev/null
selfserv with PID 13077 found at Tue Nov 27 18:59:21 EST 2012
selfserv with PID 13077 started at Tue Nov 27 18:59:21 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 100 -C c -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:21 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:59:22 EST 2012
ssl.sh: #2079: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13077 at Tue Nov 27 18:59:22 EST 2012
kill -USR1 13077
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13077 killed at Tue Nov 27 18:59:22 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 18:59:22 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13152 >/dev/null 2>/dev/null
selfserv with PID 13152 found at Tue Nov 27 18:59:22 EST 2012
selfserv with PID 13152 started at Tue Nov 27 18:59:22 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:22 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 18:59:22 EST 2012
ssl.sh: #2080: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13152 at Tue Nov 27 18:59:22 EST 2012
kill -USR1 13152
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13152 killed at Tue Nov 27 18:59:22 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 18:59:22 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13228 >/dev/null 2>/dev/null
selfserv with PID 13228 found at Tue Nov 27 18:59:22 EST 2012
selfserv with PID 13228 started at Tue Nov 27 18:59:22 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:22 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:22 EST 2012
ssl.sh: #2081: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13228 at Tue Nov 27 18:59:22 EST 2012
kill -USR1 13228
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13228 killed at Tue Nov 27 18:59:22 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 18:59:22 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13304 >/dev/null 2>/dev/null
selfserv with PID 13304 found at Tue Nov 27 18:59:22 EST 2012
selfserv with PID 13304 started at Tue Nov 27 18:59:22 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:22 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:23 EST 2012
ssl.sh: #2082: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13304 at Tue Nov 27 18:59:23 EST 2012
kill -USR1 13304
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13304 killed at Tue Nov 27 18:59:23 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 18:59:23 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13380 >/dev/null 2>/dev/null
selfserv with PID 13380 found at Tue Nov 27 18:59:23 EST 2012
selfserv with PID 13380 started at Tue Nov 27 18:59:23 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:23 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 18:59:23 EST 2012
ssl.sh: #2083: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13380 at Tue Nov 27 18:59:23 EST 2012
kill -USR1 13380
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13380 killed at Tue Nov 27 18:59:23 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 18:59:23 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13456 >/dev/null 2>/dev/null
selfserv with PID 13456 found at Tue Nov 27 18:59:23 EST 2012
selfserv with PID 13456 started at Tue Nov 27 18:59:23 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:23 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 18:59:23 EST 2012
ssl.sh: #2084: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13456 at Tue Nov 27 18:59:23 EST 2012
kill -USR1 13456
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13456 killed at Tue Nov 27 18:59:23 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 18:59:23 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13561 >/dev/null 2>/dev/null
selfserv with PID 13561 found at Tue Nov 27 18:59:23 EST 2012
selfserv with PID 13561 started at Tue Nov 27 18:59:23 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 100 -C :C009 -N -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:23 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:59:24 EST 2012
ssl.sh: #2085: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13561 at Tue Nov 27 18:59:24 EST 2012
kill -USR1 13561
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13561 killed at Tue Nov 27 18:59:24 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 18:59:24 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13636 >/dev/null 2>/dev/null
selfserv with PID 13636 found at Tue Nov 27 18:59:24 EST 2012
selfserv with PID 13636 started at Tue Nov 27 18:59:24 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 1000 -C :C013 -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:25 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:25 EST 2012
ssl.sh: #2086: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13636 at Tue Nov 27 18:59:25 EST 2012
kill -USR1 13636
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13636 killed at Tue Nov 27 18:59:25 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 18:59:25 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13712 >/dev/null 2>/dev/null
selfserv with PID 13712 found at Tue Nov 27 18:59:25 EST 2012
selfserv with PID 13712 started at Tue Nov 27 18:59:25 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 100 -C :C004 -N \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:25 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:59:26 EST 2012
ssl.sh: #2087: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13712 at Tue Nov 27 18:59:26 EST 2012
kill -USR1 13712
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13712 killed at Tue Nov 27 18:59:26 EST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 18:59:26 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13787 >/dev/null 2>/dev/null
selfserv with PID 13787 found at Tue Nov 27 18:59:26 EST 2012
selfserv with PID 13787 started at Tue Nov 27 18:59:26 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 100 -C :C00E -N \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:26 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:59:27 EST 2012
ssl.sh: #2088: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13787 at Tue Nov 27 18:59:27 EST 2012
kill -USR1 13787
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13787 killed at Tue Nov 27 18:59:27 EST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 18:59:27 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13862 >/dev/null 2>/dev/null
selfserv with PID 13862 found at Tue Nov 27 18:59:27 EST 2012
selfserv with PID 13862 started at Tue Nov 27 18:59:27 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 1000 -C :C013 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:27 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:27 EST 2012
ssl.sh: #2089: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13862 at Tue Nov 27 18:59:27 EST 2012
kill -USR1 13862
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13862 killed at Tue Nov 27 18:59:27 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 18:59:27 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13938 >/dev/null 2>/dev/null
selfserv with PID 13938 found at Tue Nov 27 18:59:27 EST 2012
selfserv with PID 13938 started at Tue Nov 27 18:59:27 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 1000 -C :C004 -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:27 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:59:28 EST 2012
ssl.sh: #2090: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13938 at Tue Nov 27 18:59:28 EST 2012
kill -USR1 13938
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13938 killed at Tue Nov 27 18:59:28 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:59:28 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14035 >/dev/null 2>/dev/null
selfserv with PID 14035 found at Tue Nov 27 18:59:28 EST 2012
selfserv with PID 14035 started at Tue Nov 27 18:59:28 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:28 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 18:59:28 EST 2012
ssl.sh: #2091: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 14035 at Tue Nov 27 18:59:28 EST 2012
kill -USR1 14035
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14035 killed at Tue Nov 27 18:59:28 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 18:59:28 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14110 >/dev/null 2>/dev/null
selfserv with PID 14110 found at Tue Nov 27 18:59:28 EST 2012
selfserv with PID 14110 started at Tue Nov 27 18:59:28 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:28 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:29 EST 2012
ssl.sh: #2092: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 14110 at Tue Nov 27 18:59:29 EST 2012
kill -USR1 14110
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14110 killed at Tue Nov 27 18:59:29 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:59:29 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14186 >/dev/null 2>/dev/null
selfserv with PID 14186 found at Tue Nov 27 18:59:29 EST 2012
selfserv with PID 14186 started at Tue Nov 27 18:59:29 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:29 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 18:59:29 EST 2012
ssl.sh: #2093: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 14186 at Tue Nov 27 18:59:29 EST 2012
kill -USR1 14186
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14186 killed at Tue Nov 27 18:59:29 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:59:29 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14262 >/dev/null 2>/dev/null
selfserv with PID 14262 found at Tue Nov 27 18:59:29 EST 2012
selfserv with PID 14262 started at Tue Nov 27 18:59:29 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:29 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 18:59:29 EST 2012
ssl.sh: #2094: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 14262 at Tue Nov 27 18:59:30 EST 2012
kill -USR1 14262
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14262 killed at Tue Nov 27 18:59:30 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 18:59:30 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14337 >/dev/null 2>/dev/null
selfserv with PID 14337 found at Tue Nov 27 18:59:30 EST 2012
selfserv with PID 14337 started at Tue Nov 27 18:59:30 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:30 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:30 EST 2012
ssl.sh: #2095: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 14337 at Tue Nov 27 18:59:30 EST 2012
kill -USR1 14337
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14337 killed at Tue Nov 27 18:59:30 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 18:59:30 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14413 >/dev/null 2>/dev/null
selfserv with PID 14413 found at Tue Nov 27 18:59:30 EST 2012
selfserv with PID 14413 started at Tue Nov 27 18:59:30 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:30 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 18:59:30 EST 2012
ssl.sh: #2096: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 14413 at Tue Nov 27 18:59:30 EST 2012
kill -USR1 14413
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14413 killed at Tue Nov 27 18:59:30 EST 2012
ssl.sh: SSL Cipher Coverage  - server normal/client bypass  - with ECC ===============================
selfserv starting at Tue Nov 27 18:59:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:30 EST 2012
selfserv with PID 14482 started at Tue Nov 27 18:59:30 EST 2012
ssl.sh: running SSL2_RC4_128_WITH_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c A -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2097: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c B -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2098: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c C -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2099: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c D -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2100: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c E -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2101: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c F -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2102: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c B -V ssl2:tls1.1 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2103: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c C -V ssl2:tls1.1 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2104: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c E -V ssl2:tls1.1 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2105: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2106: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2107: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2108: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2109: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2110: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2111: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2112: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2113: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2114: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2115: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2116: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2117: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2118: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2119: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2120: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2121: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2122: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2123: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2124: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2125: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2126: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2127: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2128: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2129: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2130: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2131: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2132: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2133: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2134: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2135: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2136: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2137: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2138: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2139: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2140: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2141: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2142: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2143: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2144: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2145: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2146: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2147: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2148: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2149: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2150: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2151: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2152: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2153: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2154: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14482 >/dev/null 2>/dev/null
selfserv with PID 14482 found at Tue Nov 27 18:59:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2155: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 14482 at Tue Nov 27 18:59:35 EST 2012
kill -USR1 14482
selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14482 killed at Tue Nov 27 18:59:35 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:59:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16072 >/dev/null 2>/dev/null
selfserv with PID 16072 found at Tue Nov 27 18:59:35 EST 2012
selfserv with PID 16072 started at Tue Nov 27 18:59:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2156: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 16072 >/dev/null 2>/dev/null
selfserv with PID 16072 found at Tue Nov 27 18:59:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2157: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16072 >/dev/null 2>/dev/null
selfserv with PID 16072 found at Tue Nov 27 18:59:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2158: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16072 >/dev/null 2>/dev/null
selfserv with PID 16072 found at Tue Nov 27 18:59:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2159: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16072 >/dev/null 2>/dev/null
selfserv with PID 16072 found at Tue Nov 27 18:59:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2160: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 16072 at Tue Nov 27 18:59:36 EST 2012
kill -USR1 16072
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16072 killed at Tue Nov 27 18:59:36 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:59:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:36 EST 2012
selfserv with PID 16220 started at Tue Nov 27 18:59:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2161: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2162: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2163: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2164: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2165: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2166: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2167: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2168: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2169: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2170: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2171: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2172: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2173: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2174: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16220 >/dev/null 2>/dev/null
selfserv with PID 16220 found at Tue Nov 27 18:59:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2175: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 16220 at Tue Nov 27 18:59:37 EST 2012
kill -USR1 16220
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16220 killed at Tue Nov 27 18:59:37 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:59:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16619 >/dev/null 2>/dev/null
selfserv with PID 16619 found at Tue Nov 27 18:59:37 EST 2012
selfserv with PID 16619 started at Tue Nov 27 18:59:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2176: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 16619 >/dev/null 2>/dev/null
selfserv with PID 16619 found at Tue Nov 27 18:59:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2177: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16619 >/dev/null 2>/dev/null
selfserv with PID 16619 found at Tue Nov 27 18:59:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2178: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16619 >/dev/null 2>/dev/null
selfserv with PID 16619 found at Tue Nov 27 18:59:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2179: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16619 >/dev/null 2>/dev/null
selfserv with PID 16619 found at Tue Nov 27 18:59:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2180: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 16619 at Tue Nov 27 18:59:38 EST 2012
kill -USR1 16619
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16619 killed at Tue Nov 27 18:59:38 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:59:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:38 EST 2012
selfserv with PID 16767 started at Tue Nov 27 18:59:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2181: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2182: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2183: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2184: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2185: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2186: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2187: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2188: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2189: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2190: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2191: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2192: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2193: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2194: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16767 >/dev/null 2>/dev/null
selfserv with PID 16767 found at Tue Nov 27 18:59:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2195: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 16767 at Tue Nov 27 18:59:39 EST 2012
kill -USR1 16767
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16767 killed at Tue Nov 27 18:59:39 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:59:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17152 >/dev/null 2>/dev/null
selfserv with PID 17152 found at Tue Nov 27 18:59:39 EST 2012
selfserv with PID 17152 started at Tue Nov 27 18:59:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2196: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 17152 >/dev/null 2>/dev/null
selfserv with PID 17152 found at Tue Nov 27 18:59:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2197: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17152 >/dev/null 2>/dev/null
selfserv with PID 17152 found at Tue Nov 27 18:59:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2198: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17152 >/dev/null 2>/dev/null
selfserv with PID 17152 found at Tue Nov 27 18:59:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2199: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17152 >/dev/null 2>/dev/null
selfserv with PID 17152 found at Tue Nov 27 18:59:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2200: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 17152 at Tue Nov 27 18:59:39 EST 2012
kill -USR1 17152
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17152 killed at Tue Nov 27 18:59:40 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 18:59:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17300 >/dev/null 2>/dev/null
selfserv with PID 17300 found at Tue Nov 27 18:59:40 EST 2012
selfserv with PID 17300 started at Tue Nov 27 18:59:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2201: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 17300 >/dev/null 2>/dev/null
selfserv with PID 17300 found at Tue Nov 27 18:59:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2202: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17300 >/dev/null 2>/dev/null
selfserv with PID 17300 found at Tue Nov 27 18:59:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2203: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17300 >/dev/null 2>/dev/null
selfserv with PID 17300 found at Tue Nov 27 18:59:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2204: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17300 >/dev/null 2>/dev/null
selfserv with PID 17300 found at Tue Nov 27 18:59:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2205: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17300 at Tue Nov 27 18:59:40 EST 2012
kill -USR1 17300
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17300 killed at Tue Nov 27 18:59:40 EST 2012
ssl.sh: SSL Client Authentication  - server normal/client bypass  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17500 >/dev/null 2>/dev/null
selfserv with PID 17500 found at Tue Nov 27 18:59:40 EST 2012
selfserv with PID 17500 started at Tue Nov 27 18:59:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2206: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17500 at Tue Nov 27 18:59:40 EST 2012
kill -USR1 17500
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17500 killed at Tue Nov 27 18:59:40 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:59:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17557 >/dev/null 2>/dev/null
selfserv with PID 17557 found at Tue Nov 27 18:59:40 EST 2012
selfserv with PID 17557 started at Tue Nov 27 18:59:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2207: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17557 at Tue Nov 27 18:59:40 EST 2012
kill -USR1 17557
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17557 killed at Tue Nov 27 18:59:40 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:59:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17614 >/dev/null 2>/dev/null
selfserv with PID 17614 found at Tue Nov 27 18:59:40 EST 2012
selfserv with PID 17614 started at Tue Nov 27 18:59:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2208: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17614 at Tue Nov 27 18:59:41 EST 2012
kill -USR1 17614
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17614 killed at Tue Nov 27 18:59:41 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17671 >/dev/null 2>/dev/null
selfserv with PID 17671 found at Tue Nov 27 18:59:41 EST 2012
selfserv with PID 17671 started at Tue Nov 27 18:59:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2209: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17671 at Tue Nov 27 18:59:41 EST 2012
kill -USR1 17671
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17671 killed at Tue Nov 27 18:59:41 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:59:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17728 >/dev/null 2>/dev/null
selfserv with PID 17728 found at Tue Nov 27 18:59:41 EST 2012
selfserv with PID 17728 started at Tue Nov 27 18:59:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2210: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17728 at Tue Nov 27 18:59:41 EST 2012
kill -USR1 17728
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17728 killed at Tue Nov 27 18:59:41 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:59:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17785 >/dev/null 2>/dev/null
selfserv with PID 17785 found at Tue Nov 27 18:59:41 EST 2012
selfserv with PID 17785 started at Tue Nov 27 18:59:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w nss -n TestUser   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2211: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17785 at Tue Nov 27 18:59:41 EST 2012
kill -USR1 17785
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17785 killed at Tue Nov 27 18:59:41 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17842 >/dev/null 2>/dev/null
selfserv with PID 17842 found at Tue Nov 27 18:59:41 EST 2012
selfserv with PID 17842 started at Tue Nov 27 18:59:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2212: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17842 at Tue Nov 27 18:59:41 EST 2012
kill -USR1 17842
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17842 killed at Tue Nov 27 18:59:41 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:59:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17899 >/dev/null 2>/dev/null
selfserv with PID 17899 found at Tue Nov 27 18:59:42 EST 2012
selfserv with PID 17899 started at Tue Nov 27 18:59:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2213: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17899 at Tue Nov 27 18:59:42 EST 2012
kill -USR1 17899
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17899 killed at Tue Nov 27 18:59:42 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:59:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17956 >/dev/null 2>/dev/null
selfserv with PID 17956 found at Tue Nov 27 18:59:42 EST 2012
selfserv with PID 17956 started at Tue Nov 27 18:59:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2214: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17956 at Tue Nov 27 18:59:42 EST 2012
kill -USR1 17956
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17956 killed at Tue Nov 27 18:59:42 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18013 >/dev/null 2>/dev/null
selfserv with PID 18013 found at Tue Nov 27 18:59:42 EST 2012
selfserv with PID 18013 started at Tue Nov 27 18:59:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2215: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18013 at Tue Nov 27 18:59:42 EST 2012
kill -USR1 18013
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18013 killed at Tue Nov 27 18:59:42 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 18:59:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18071 >/dev/null 2>/dev/null
selfserv with PID 18071 found at Tue Nov 27 18:59:42 EST 2012
selfserv with PID 18071 started at Tue Nov 27 18:59:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2216: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18071 at Tue Nov 27 18:59:42 EST 2012
kill -USR1 18071
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18071 killed at Tue Nov 27 18:59:42 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 18:59:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18128 >/dev/null 2>/dev/null
selfserv with PID 18128 found at Tue Nov 27 18:59:42 EST 2012
selfserv with PID 18128 started at Tue Nov 27 18:59:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2217: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18128 at Tue Nov 27 18:59:43 EST 2012
kill -USR1 18128
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18128 killed at Tue Nov 27 18:59:43 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18185 >/dev/null 2>/dev/null
selfserv with PID 18185 found at Tue Nov 27 18:59:43 EST 2012
selfserv with PID 18185 started at Tue Nov 27 18:59:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2218: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18185 at Tue Nov 27 18:59:43 EST 2012
kill -USR1 18185
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18185 killed at Tue Nov 27 18:59:43 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:59:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18242 >/dev/null 2>/dev/null
selfserv with PID 18242 found at Tue Nov 27 18:59:43 EST 2012
selfserv with PID 18242 started at Tue Nov 27 18:59:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2219: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18242 at Tue Nov 27 18:59:43 EST 2012
kill -USR1 18242
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18242 killed at Tue Nov 27 18:59:43 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:59:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18299 >/dev/null 2>/dev/null
selfserv with PID 18299 found at Tue Nov 27 18:59:43 EST 2012
selfserv with PID 18299 started at Tue Nov 27 18:59:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2220: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18299 at Tue Nov 27 18:59:43 EST 2012
kill -USR1 18299
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18299 killed at Tue Nov 27 18:59:43 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18356 >/dev/null 2>/dev/null
selfserv with PID 18356 found at Tue Nov 27 18:59:43 EST 2012
selfserv with PID 18356 started at Tue Nov 27 18:59:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2221: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18356 at Tue Nov 27 18:59:43 EST 2012
kill -USR1 18356
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18356 killed at Tue Nov 27 18:59:43 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:59:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18413 >/dev/null 2>/dev/null
selfserv with PID 18413 found at Tue Nov 27 18:59:43 EST 2012
selfserv with PID 18413 started at Tue Nov 27 18:59:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2222: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18413 at Tue Nov 27 18:59:44 EST 2012
kill -USR1 18413
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18413 killed at Tue Nov 27 18:59:44 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:59:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18470 >/dev/null 2>/dev/null
selfserv with PID 18470 found at Tue Nov 27 18:59:44 EST 2012
selfserv with PID 18470 started at Tue Nov 27 18:59:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2223: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18470 at Tue Nov 27 18:59:44 EST 2012
kill -USR1 18470
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18470 killed at Tue Nov 27 18:59:44 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18527 >/dev/null 2>/dev/null
selfserv with PID 18527 found at Tue Nov 27 18:59:44 EST 2012
selfserv with PID 18527 started at Tue Nov 27 18:59:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2224: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18527 at Tue Nov 27 18:59:44 EST 2012
kill -USR1 18527
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18527 killed at Tue Nov 27 18:59:44 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:59:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18584 >/dev/null 2>/dev/null
selfserv with PID 18584 found at Tue Nov 27 18:59:44 EST 2012
selfserv with PID 18584 started at Tue Nov 27 18:59:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2225: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18584 at Tue Nov 27 18:59:44 EST 2012
kill -USR1 18584
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18584 killed at Tue Nov 27 18:59:44 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:59:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18641 >/dev/null 2>/dev/null
selfserv with PID 18641 found at Tue Nov 27 18:59:44 EST 2012
selfserv with PID 18641 started at Tue Nov 27 18:59:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2226: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18641 at Tue Nov 27 18:59:44 EST 2012
kill -USR1 18641
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18641 killed at Tue Nov 27 18:59:45 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18698 >/dev/null 2>/dev/null
selfserv with PID 18698 found at Tue Nov 27 18:59:45 EST 2012
selfserv with PID 18698 started at Tue Nov 27 18:59:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2227: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18698 at Tue Nov 27 18:59:45 EST 2012
kill -USR1 18698
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18698 killed at Tue Nov 27 18:59:45 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:59:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18755 >/dev/null 2>/dev/null
selfserv with PID 18755 found at Tue Nov 27 18:59:45 EST 2012
selfserv with PID 18755 started at Tue Nov 27 18:59:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2228: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18755 at Tue Nov 27 18:59:45 EST 2012
kill -USR1 18755
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18755 killed at Tue Nov 27 18:59:45 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:59:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18812 >/dev/null 2>/dev/null
selfserv with PID 18812 found at Tue Nov 27 18:59:45 EST 2012
selfserv with PID 18812 started at Tue Nov 27 18:59:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2229: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18812 at Tue Nov 27 18:59:45 EST 2012
kill -USR1 18812
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18812 killed at Tue Nov 27 18:59:45 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18869 >/dev/null 2>/dev/null
selfserv with PID 18869 found at Tue Nov 27 18:59:45 EST 2012
selfserv with PID 18869 started at Tue Nov 27 18:59:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2230: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18869 at Tue Nov 27 18:59:45 EST 2012
kill -USR1 18869
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18869 killed at Tue Nov 27 18:59:45 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:59:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18926 >/dev/null 2>/dev/null
selfserv with PID 18926 found at Tue Nov 27 18:59:45 EST 2012
selfserv with PID 18926 started at Tue Nov 27 18:59:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2231: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18926 at Tue Nov 27 18:59:46 EST 2012
kill -USR1 18926
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18926 killed at Tue Nov 27 18:59:46 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:59:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18983 >/dev/null 2>/dev/null
selfserv with PID 18983 found at Tue Nov 27 18:59:46 EST 2012
selfserv with PID 18983 started at Tue Nov 27 18:59:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2232: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18983 at Tue Nov 27 18:59:46 EST 2012
kill -USR1 18983
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18983 killed at Tue Nov 27 18:59:46 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 18:59:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19040 >/dev/null 2>/dev/null
selfserv with PID 19040 found at Tue Nov 27 18:59:46 EST 2012
selfserv with PID 19040 started at Tue Nov 27 18:59:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2233: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19040 at Tue Nov 27 18:59:46 EST 2012
kill -USR1 19040
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19040 killed at Tue Nov 27 18:59:46 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 18:59:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19097 >/dev/null 2>/dev/null
selfserv with PID 19097 found at Tue Nov 27 18:59:46 EST 2012
selfserv with PID 19097 started at Tue Nov 27 18:59:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2234: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19097 at Tue Nov 27 18:59:46 EST 2012
kill -USR1 19097
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19097 killed at Tue Nov 27 18:59:46 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 18:59:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19154 >/dev/null 2>/dev/null
selfserv with PID 19154 found at Tue Nov 27 18:59:46 EST 2012
selfserv with PID 19154 started at Tue Nov 27 18:59:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2235: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19154 at Tue Nov 27 18:59:46 EST 2012
kill -USR1 19154
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19154 killed at Tue Nov 27 18:59:46 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19226 >/dev/null 2>/dev/null
selfserv with PID 19226 found at Tue Nov 27 18:59:46 EST 2012
selfserv with PID 19226 started at Tue Nov 27 18:59:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2236: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19226 at Tue Nov 27 18:59:47 EST 2012
kill -USR1 19226
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19226 killed at Tue Nov 27 18:59:47 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19283 >/dev/null 2>/dev/null
selfserv with PID 19283 found at Tue Nov 27 18:59:47 EST 2012
selfserv with PID 19283 started at Tue Nov 27 18:59:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w nss -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2237: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19283 at Tue Nov 27 18:59:47 EST 2012
kill -USR1 19283
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19283 killed at Tue Nov 27 18:59:47 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19340 >/dev/null 2>/dev/null
selfserv with PID 19340 found at Tue Nov 27 18:59:47 EST 2012
selfserv with PID 19340 started at Tue Nov 27 18:59:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2238: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19340 at Tue Nov 27 18:59:47 EST 2012
kill -USR1 19340
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19340 killed at Tue Nov 27 18:59:47 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19397 >/dev/null 2>/dev/null
selfserv with PID 19397 found at Tue Nov 27 18:59:47 EST 2012
selfserv with PID 19397 started at Tue Nov 27 18:59:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2239: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19397 at Tue Nov 27 18:59:47 EST 2012
kill -USR1 19397
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19397 killed at Tue Nov 27 18:59:47 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19454 >/dev/null 2>/dev/null
selfserv with PID 19454 found at Tue Nov 27 18:59:47 EST 2012
selfserv with PID 19454 started at Tue Nov 27 18:59:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2240: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19454 at Tue Nov 27 18:59:47 EST 2012
kill -USR1 19454
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19454 killed at Tue Nov 27 18:59:47 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19511 >/dev/null 2>/dev/null
selfserv with PID 19511 found at Tue Nov 27 18:59:48 EST 2012
selfserv with PID 19511 started at Tue Nov 27 18:59:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2241: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19511 at Tue Nov 27 18:59:48 EST 2012
kill -USR1 19511
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19511 killed at Tue Nov 27 18:59:48 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19568 >/dev/null 2>/dev/null
selfserv with PID 19568 found at Tue Nov 27 18:59:48 EST 2012
selfserv with PID 19568 started at Tue Nov 27 18:59:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2242: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19568 at Tue Nov 27 18:59:48 EST 2012
kill -USR1 19568
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19568 killed at Tue Nov 27 18:59:48 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19625 >/dev/null 2>/dev/null
selfserv with PID 19625 found at Tue Nov 27 18:59:48 EST 2012
selfserv with PID 19625 started at Tue Nov 27 18:59:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2243: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19625 at Tue Nov 27 18:59:48 EST 2012
kill -USR1 19625
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19625 killed at Tue Nov 27 18:59:48 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19682 >/dev/null 2>/dev/null
selfserv with PID 19682 found at Tue Nov 27 18:59:48 EST 2012
selfserv with PID 19682 started at Tue Nov 27 18:59:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2244: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19682 at Tue Nov 27 18:59:48 EST 2012
kill -USR1 19682
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19682 killed at Tue Nov 27 18:59:48 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19739 >/dev/null 2>/dev/null
selfserv with PID 19739 found at Tue Nov 27 18:59:49 EST 2012
selfserv with PID 19739 started at Tue Nov 27 18:59:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2245: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19739 at Tue Nov 27 18:59:49 EST 2012
kill -USR1 19739
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19739 killed at Tue Nov 27 18:59:49 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19796 >/dev/null 2>/dev/null
selfserv with PID 19796 found at Tue Nov 27 18:59:49 EST 2012
selfserv with PID 19796 started at Tue Nov 27 18:59:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2246: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19796 at Tue Nov 27 18:59:49 EST 2012
kill -USR1 19796
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19796 killed at Tue Nov 27 18:59:49 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19853 >/dev/null 2>/dev/null
selfserv with PID 19853 found at Tue Nov 27 18:59:49 EST 2012
selfserv with PID 19853 started at Tue Nov 27 18:59:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2247: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19853 at Tue Nov 27 18:59:49 EST 2012
kill -USR1 19853
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19853 killed at Tue Nov 27 18:59:49 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19910 >/dev/null 2>/dev/null
selfserv with PID 19910 found at Tue Nov 27 18:59:49 EST 2012
selfserv with PID 19910 started at Tue Nov 27 18:59:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2248: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19910 at Tue Nov 27 18:59:49 EST 2012
kill -USR1 19910
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19910 killed at Tue Nov 27 18:59:49 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19967 >/dev/null 2>/dev/null
selfserv with PID 19967 found at Tue Nov 27 18:59:49 EST 2012
selfserv with PID 19967 started at Tue Nov 27 18:59:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2249: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19967 at Tue Nov 27 18:59:50 EST 2012
kill -USR1 19967
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19967 killed at Tue Nov 27 18:59:50 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20024 >/dev/null 2>/dev/null
selfserv with PID 20024 found at Tue Nov 27 18:59:50 EST 2012
selfserv with PID 20024 started at Tue Nov 27 18:59:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2250: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20024 at Tue Nov 27 18:59:50 EST 2012
kill -USR1 20024
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20024 killed at Tue Nov 27 18:59:50 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20081 >/dev/null 2>/dev/null
selfserv with PID 20081 found at Tue Nov 27 18:59:50 EST 2012
selfserv with PID 20081 started at Tue Nov 27 18:59:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2251: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20081 at Tue Nov 27 18:59:50 EST 2012
kill -USR1 20081
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20081 killed at Tue Nov 27 18:59:50 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20138 >/dev/null 2>/dev/null
selfserv with PID 20138 found at Tue Nov 27 18:59:50 EST 2012
selfserv with PID 20138 started at Tue Nov 27 18:59:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2252: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20138 at Tue Nov 27 18:59:50 EST 2012
kill -USR1 20138
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20138 killed at Tue Nov 27 18:59:50 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20195 >/dev/null 2>/dev/null
selfserv with PID 20195 found at Tue Nov 27 18:59:50 EST 2012
selfserv with PID 20195 started at Tue Nov 27 18:59:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2253: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20195 at Tue Nov 27 18:59:51 EST 2012
kill -USR1 20195
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20195 killed at Tue Nov 27 18:59:51 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 18:59:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20253 >/dev/null 2>/dev/null
selfserv with PID 20253 found at Tue Nov 27 18:59:51 EST 2012
selfserv with PID 20253 started at Tue Nov 27 18:59:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2254: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20253 at Tue Nov 27 18:59:51 EST 2012
kill -USR1 20253
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20253 killed at Tue Nov 27 18:59:51 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 18:59:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20310 >/dev/null 2>/dev/null
selfserv with PID 20310 found at Tue Nov 27 18:59:51 EST 2012
selfserv with PID 20310 started at Tue Nov 27 18:59:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2255: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20310 at Tue Nov 27 18:59:51 EST 2012
kill -USR1 20310
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20310 killed at Tue Nov 27 18:59:51 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 18:59:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20388 >/dev/null 2>/dev/null
selfserv with PID 20388 found at Tue Nov 27 18:59:51 EST 2012
selfserv with PID 20388 started at Tue Nov 27 18:59:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2256: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20388 at Tue Nov 27 18:59:51 EST 2012
kill -USR1 20388
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20388 killed at Tue Nov 27 18:59:51 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 18:59:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20451 >/dev/null 2>/dev/null
selfserv with PID 20451 found at Tue Nov 27 18:59:51 EST 2012
selfserv with PID 20451 started at Tue Nov 27 18:59:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2257: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20451 at Tue Nov 27 18:59:52 EST 2012
kill -USR1 20451
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20451 killed at Tue Nov 27 18:59:52 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 18:59:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20514 >/dev/null 2>/dev/null
selfserv with PID 20514 found at Tue Nov 27 18:59:52 EST 2012
selfserv with PID 20514 started at Tue Nov 27 18:59:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2258: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20514 at Tue Nov 27 18:59:52 EST 2012
kill -USR1 20514
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20514 killed at Tue Nov 27 18:59:52 EST 2012
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Tue Nov 27 18:59:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20577 >/dev/null 2>/dev/null
selfserv with PID 20577 found at Tue Nov 27 18:59:52 EST 2012
selfserv with PID 20577 started at Tue Nov 27 18:59:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2259: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20577 at Tue Nov 27 18:59:52 EST 2012
kill -USR1 20577
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20577 killed at Tue Nov 27 18:59:52 EST 2012
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Tue Nov 27 18:59:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20640 >/dev/null 2>/dev/null
selfserv with PID 20640 found at Tue Nov 27 18:59:52 EST 2012
selfserv with PID 20640 started at Tue Nov 27 18:59:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #2260: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20640 at Tue Nov 27 18:59:52 EST 2012
kill -USR1 20640
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20640 killed at Tue Nov 27 18:59:52 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 18:59:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20703 >/dev/null 2>/dev/null
selfserv with PID 20703 found at Tue Nov 27 18:59:52 EST 2012
selfserv with PID 20703 started at Tue Nov 27 18:59:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2261: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20703 at Tue Nov 27 18:59:52 EST 2012
kill -USR1 20703
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20703 killed at Tue Nov 27 18:59:52 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 18:59:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20766 >/dev/null 2>/dev/null
selfserv with PID 20766 found at Tue Nov 27 18:59:53 EST 2012
selfserv with PID 20766 started at Tue Nov 27 18:59:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2262: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20766 at Tue Nov 27 18:59:53 EST 2012
kill -USR1 20766
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20766 killed at Tue Nov 27 18:59:53 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Tue Nov 27 18:59:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20829 >/dev/null 2>/dev/null
selfserv with PID 20829 found at Tue Nov 27 18:59:53 EST 2012
selfserv with PID 20829 started at Tue Nov 27 18:59:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s).
tstclnt: exiting with return code 1
ssl.sh: #2263: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20829 at Tue Nov 27 18:59:53 EST 2012
kill -USR1 20829
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20829 killed at Tue Nov 27 18:59:53 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Tue Nov 27 18:59:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20892 >/dev/null 2>/dev/null
selfserv with PID 20892 found at Tue Nov 27 18:59:53 EST 2012
selfserv with PID 20892 started at Tue Nov 27 18:59:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #2264: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20892 at Tue Nov 27 18:59:53 EST 2012
kill -USR1 20892
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20892 killed at Tue Nov 27 18:59:53 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 18:59:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20955 >/dev/null 2>/dev/null
selfserv with PID 20955 found at Tue Nov 27 18:59:53 EST 2012
selfserv with PID 20955 started at Tue Nov 27 18:59:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2265: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20955 at Tue Nov 27 18:59:53 EST 2012
kill -USR1 20955
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20955 killed at Tue Nov 27 18:59:53 EST 2012
ssl.sh: SSL Stress Test  - server normal/client bypass  - with ECC ===============================
ssl.sh: Stress SSL2 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 18:59:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21087 >/dev/null 2>/dev/null
selfserv with PID 21087 found at Tue Nov 27 18:59:54 EST 2012
selfserv with PID 21087 started at Tue Nov 27 18:59:54 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C A \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: SSL2 - 1 server certificates tested.
strsclnt completed at Tue Nov 27 18:59:54 EST 2012
ssl.sh: #2266: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21087 at Tue Nov 27 18:59:54 EST 2012
kill -USR1 21087
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21087 killed at Tue Nov 27 18:59:54 EST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 18:59:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21163 >/dev/null 2>/dev/null
selfserv with PID 21163 found at Tue Nov 27 18:59:54 EST 2012
selfserv with PID 21163 started at Tue Nov 27 18:59:54 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C c -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:54 EST 2012
ssl.sh: #2267: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21163 at Tue Nov 27 18:59:54 EST 2012
kill -USR1 21163
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21163 killed at Tue Nov 27 18:59:54 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 18:59:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21239 >/dev/null 2>/dev/null
selfserv with PID 21239 found at Tue Nov 27 18:59:54 EST 2012
selfserv with PID 21239 started at Tue Nov 27 18:59:54 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C c \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:55 EST 2012
ssl.sh: #2268: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21239 at Tue Nov 27 18:59:55 EST 2012
kill -USR1 21239
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21239 killed at Tue Nov 27 18:59:55 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 18:59:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21315 >/dev/null 2>/dev/null
selfserv with PID 21315 found at Tue Nov 27 18:59:55 EST 2012
selfserv with PID 21315 started at Tue Nov 27 18:59:55 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C c -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:55 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:55 EST 2012
ssl.sh: #2269: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21315 at Tue Nov 27 18:59:55 EST 2012
kill -USR1 21315
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21315 killed at Tue Nov 27 18:59:55 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 18:59:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21391 >/dev/null 2>/dev/null
selfserv with PID 21391 found at Tue Nov 27 18:59:55 EST 2012
selfserv with PID 21391 started at Tue Nov 27 18:59:55 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:55 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:59:56 EST 2012
ssl.sh: #2270: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21391 at Tue Nov 27 18:59:56 EST 2012
kill -USR1 21391
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21391 killed at Tue Nov 27 18:59:56 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 18:59:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21467 >/dev/null 2>/dev/null
selfserv with PID 21467 found at Tue Nov 27 18:59:56 EST 2012
selfserv with PID 21467 started at Tue Nov 27 18:59:56 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:56 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 18:59:56 EST 2012
ssl.sh: #2271: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21467 at Tue Nov 27 18:59:56 EST 2012
kill -USR1 21467
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21467 killed at Tue Nov 27 18:59:56 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 18:59:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21543 >/dev/null 2>/dev/null
selfserv with PID 21543 found at Tue Nov 27 18:59:56 EST 2012
selfserv with PID 21543 started at Tue Nov 27 18:59:56 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:56 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:59:57 EST 2012
ssl.sh: #2272: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21543 at Tue Nov 27 18:59:57 EST 2012
kill -USR1 21543
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21543 killed at Tue Nov 27 18:59:57 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 18:59:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21619 >/dev/null 2>/dev/null
selfserv with PID 21619 found at Tue Nov 27 18:59:57 EST 2012
selfserv with PID 21619 started at Tue Nov 27 18:59:57 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:57 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:59:57 EST 2012
ssl.sh: #2273: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21619 at Tue Nov 27 18:59:57 EST 2012
kill -USR1 21619
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21619 killed at Tue Nov 27 18:59:57 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Tue Nov 27 18:59:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21701 >/dev/null 2>/dev/null
selfserv with PID 21701 found at Tue Nov 27 18:59:57 EST 2012
selfserv with PID 21701 started at Tue Nov 27 18:59:57 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:57 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 18:59:58 EST 2012
ssl.sh: #2274: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21701 at Tue Nov 27 18:59:58 EST 2012
kill -USR1 21701
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21701 killed at Tue Nov 27 18:59:58 EST 2012
ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:59:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21798 >/dev/null 2>/dev/null
selfserv with PID 21798 found at Tue Nov 27 18:59:58 EST 2012
selfserv with PID 21798 started at Tue Nov 27 18:59:58 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:58 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: SSL2 - 100 server certificates tested.
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:59:59 EST 2012
ssl.sh: #2275: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21798 at Tue Nov 27 18:59:59 EST 2012
kill -USR1 21798
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21798 killed at Tue Nov 27 18:59:59 EST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:59:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21873 >/dev/null 2>/dev/null
selfserv with PID 21873 found at Tue Nov 27 18:59:59 EST 2012
selfserv with PID 21873 started at Tue Nov 27 18:59:59 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:59 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 18:59:59 EST 2012
ssl.sh: #2276: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21873 at Tue Nov 27 18:59:59 EST 2012
kill -USR1 21873
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21873 killed at Tue Nov 27 18:59:59 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 18:59:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 18:59:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21948 >/dev/null 2>/dev/null
selfserv with PID 21948 found at Tue Nov 27 18:59:59 EST 2012
selfserv with PID 21948 started at Tue Nov 27 18:59:59 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 18:59:59 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:00 EST 2012
ssl.sh: #2277: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21948 at Tue Nov 27 19:00:00 EST 2012
kill -USR1 21948
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21948 killed at Tue Nov 27 19:00:00 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:00:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22023 >/dev/null 2>/dev/null
selfserv with PID 22023 found at Tue Nov 27 19:00:00 EST 2012
selfserv with PID 22023 started at Tue Nov 27 19:00:00 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:00 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:00:00 EST 2012
ssl.sh: #2278: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 22023 at Tue Nov 27 19:00:00 EST 2012
kill -USR1 22023
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22023 killed at Tue Nov 27 19:00:00 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 19:00:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22099 >/dev/null 2>/dev/null
selfserv with PID 22099 found at Tue Nov 27 19:00:00 EST 2012
selfserv with PID 22099 started at Tue Nov 27 19:00:00 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:00 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:00 EST 2012
ssl.sh: #2279: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 22099 at Tue Nov 27 19:00:00 EST 2012
kill -USR1 22099
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22099 killed at Tue Nov 27 19:00:00 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:00:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22175 >/dev/null 2>/dev/null
selfserv with PID 22175 found at Tue Nov 27 19:00:00 EST 2012
selfserv with PID 22175 started at Tue Nov 27 19:00:00 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:00 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:01 EST 2012
ssl.sh: #2280: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 22175 at Tue Nov 27 19:00:01 EST 2012
kill -USR1 22175
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22175 killed at Tue Nov 27 19:00:01 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 19:00:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22251 >/dev/null 2>/dev/null
selfserv with PID 22251 found at Tue Nov 27 19:00:01 EST 2012
selfserv with PID 22251 started at Tue Nov 27 19:00:01 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:01 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:00:01 EST 2012
ssl.sh: #2281: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 22251 at Tue Nov 27 19:00:01 EST 2012
kill -USR1 22251
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22251 killed at Tue Nov 27 19:00:01 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:00:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22327 >/dev/null 2>/dev/null
selfserv with PID 22327 found at Tue Nov 27 19:00:01 EST 2012
selfserv with PID 22327 started at Tue Nov 27 19:00:01 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:01 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:00:01 EST 2012
ssl.sh: #2282: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 22327 at Tue Nov 27 19:00:01 EST 2012
kill -USR1 22327
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22327 killed at Tue Nov 27 19:00:01 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Tue Nov 27 19:00:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22417 >/dev/null 2>/dev/null
selfserv with PID 22417 found at Tue Nov 27 19:00:01 EST 2012
selfserv with PID 22417 started at Tue Nov 27 19:00:01 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:01 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:00:02 EST 2012
ssl.sh: #2283: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 22417 at Tue Nov 27 19:00:02 EST 2012
kill -USR1 22417
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22417 killed at Tue Nov 27 19:00:02 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Tue Nov 27 19:00:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -k buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22499 >/dev/null 2>/dev/null
selfserv with PID 22499 found at Tue Nov 27 19:00:02 EST 2012
selfserv with PID 22499 started at Tue Nov 27 19:00:02 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a buildnss02-sni.usersys.redhat.com \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:02 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:00:02 EST 2012
ssl.sh: #2284: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 22499 at Tue Nov 27 19:00:02 EST 2012
kill -USR1 22499
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22499 killed at Tue Nov 27 19:00:02 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:00:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22596 >/dev/null 2>/dev/null
selfserv with PID 22596 found at Tue Nov 27 19:00:02 EST 2012
selfserv with PID 22596 started at Tue Nov 27 19:00:02 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:02 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:03 EST 2012
ssl.sh: #2285: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 22596 at Tue Nov 27 19:00:03 EST 2012
kill -USR1 22596
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22596 killed at Tue Nov 27 19:00:03 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:00:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22671 >/dev/null 2>/dev/null
selfserv with PID 22671 found at Tue Nov 27 19:00:03 EST 2012
selfserv with PID 22671 started at Tue Nov 27 19:00:03 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:03 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:04 EST 2012
ssl.sh: #2286: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 22671 at Tue Nov 27 19:00:04 EST 2012
kill -USR1 22671
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22671 killed at Tue Nov 27 19:00:04 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:00:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22749 >/dev/null 2>/dev/null
selfserv with PID 22749 found at Tue Nov 27 19:00:04 EST 2012
selfserv with PID 22749 started at Tue Nov 27 19:00:04 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:04 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:05 EST 2012
ssl.sh: #2287: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 22749 at Tue Nov 27 19:00:05 EST 2012
kill -USR1 22749
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22749 killed at Tue Nov 27 19:00:05 EST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:00:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22824 >/dev/null 2>/dev/null
selfserv with PID 22824 found at Tue Nov 27 19:00:05 EST 2012
selfserv with PID 22824 started at Tue Nov 27 19:00:05 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:05 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:06 EST 2012
ssl.sh: #2288: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 22824 at Tue Nov 27 19:00:06 EST 2012
kill -USR1 22824
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22824 killed at Tue Nov 27 19:00:06 EST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:00:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22899 >/dev/null 2>/dev/null
selfserv with PID 22899 found at Tue Nov 27 19:00:06 EST 2012
selfserv with PID 22899 started at Tue Nov 27 19:00:06 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:06 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:06 EST 2012
ssl.sh: #2289: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 22899 at Tue Nov 27 19:00:06 EST 2012
kill -USR1 22899
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22899 killed at Tue Nov 27 19:00:06 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 19:00:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22975 >/dev/null 2>/dev/null
selfserv with PID 22975 found at Tue Nov 27 19:00:06 EST 2012
selfserv with PID 22975 started at Tue Nov 27 19:00:06 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:06 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:00:07 EST 2012
ssl.sh: #2290: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 22975 at Tue Nov 27 19:00:07 EST 2012
kill -USR1 22975
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22975 killed at Tue Nov 27 19:00:07 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:00:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23072 >/dev/null 2>/dev/null
selfserv with PID 23072 found at Tue Nov 27 19:00:07 EST 2012
selfserv with PID 23072 started at Tue Nov 27 19:00:07 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:07 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:07 EST 2012
ssl.sh: #2291: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 23072 at Tue Nov 27 19:00:07 EST 2012
kill -USR1 23072
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23072 killed at Tue Nov 27 19:00:07 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 19:00:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23147 >/dev/null 2>/dev/null
selfserv with PID 23147 found at Tue Nov 27 19:00:07 EST 2012
selfserv with PID 23147 started at Tue Nov 27 19:00:07 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:07 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:07 EST 2012
ssl.sh: #2292: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 23147 at Tue Nov 27 19:00:07 EST 2012
kill -USR1 23147
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23147 killed at Tue Nov 27 19:00:07 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:00:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23223 >/dev/null 2>/dev/null
selfserv with PID 23223 found at Tue Nov 27 19:00:07 EST 2012
selfserv with PID 23223 started at Tue Nov 27 19:00:07 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 10 -C :C004 -N -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:07 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:08 EST 2012
ssl.sh: #2293: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 23223 at Tue Nov 27 19:00:08 EST 2012
kill -USR1 23223
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23223 killed at Tue Nov 27 19:00:08 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:00:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23298 >/dev/null 2>/dev/null
selfserv with PID 23298 found at Tue Nov 27 19:00:08 EST 2012
selfserv with PID 23298 started at Tue Nov 27 19:00:08 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:08 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:08 EST 2012
ssl.sh: #2294: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 23298 at Tue Nov 27 19:00:08 EST 2012
kill -USR1 23298
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23298 killed at Tue Nov 27 19:00:08 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 19:00:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23373 >/dev/null 2>/dev/null
selfserv with PID 23373 found at Tue Nov 27 19:00:08 EST 2012
selfserv with PID 23373 started at Tue Nov 27 19:00:08 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C :C013 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:08 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:08 EST 2012
ssl.sh: #2295: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 23373 at Tue Nov 27 19:00:08 EST 2012
kill -USR1 23373
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23373 killed at Tue Nov 27 19:00:08 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:00:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23449 >/dev/null 2>/dev/null
selfserv with PID 23449 found at Tue Nov 27 19:00:08 EST 2012
selfserv with PID 23449 started at Tue Nov 27 19:00:08 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:08 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:00:09 EST 2012
ssl.sh: #2296: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 23449 at Tue Nov 27 19:00:09 EST 2012
kill -USR1 23449
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23449 killed at Tue Nov 27 19:00:09 EST 2012
ssl.sh: SSL Cipher Coverage Extended Test - server normal/client bypass  - with ECC ===============================
selfserv starting at Tue Nov 27 19:00:09 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:09 EST 2012
selfserv with PID 23512 started at Tue Nov 27 19:00:09 EST 2012
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2297: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2298: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2299: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2300: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2301: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2302: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2303: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2304: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2305: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2306: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2307: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2308: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2309: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2310: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2311: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2312: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2313: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2314: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2315: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2316: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2317: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2318: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2319: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2320: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2321: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2322: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2323: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2324: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2325: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2326: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2327: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2328: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2329: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2330: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2331: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2332: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2333: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2334: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2335: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2336: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2337: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2338: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2339: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2340: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2341: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2342: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2343: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2344: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2345: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23512 >/dev/null 2>/dev/null
selfserv with PID 23512 found at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2346: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 23512 at Tue Nov 27 19:00:13 EST 2012
kill -USR1 23512
selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23512 killed at Tue Nov 27 19:00:13 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:00:13 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24931 >/dev/null 2>/dev/null
selfserv with PID 24931 found at Tue Nov 27 19:00:13 EST 2012
selfserv with PID 24931 started at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2347: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 24931 >/dev/null 2>/dev/null
selfserv with PID 24931 found at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2348: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 24931 >/dev/null 2>/dev/null
selfserv with PID 24931 found at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2349: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 24931 >/dev/null 2>/dev/null
selfserv with PID 24931 found at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2350: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 24931 >/dev/null 2>/dev/null
selfserv with PID 24931 found at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2351: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 24931 at Tue Nov 27 19:00:13 EST 2012
kill -USR1 24931
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24931 killed at Tue Nov 27 19:00:13 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:00:13 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:13 EST 2012
selfserv with PID 25079 started at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2352: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2353: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2354: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2355: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2356: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2357: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2358: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2359: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2360: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2361: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2362: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2363: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2364: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2365: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 25079 >/dev/null 2>/dev/null
selfserv with PID 25079 found at Tue Nov 27 19:00:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2366: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 25079 at Tue Nov 27 19:00:15 EST 2012
kill -USR1 25079
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25079 killed at Tue Nov 27 19:00:15 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:00:15 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25478 >/dev/null 2>/dev/null
selfserv with PID 25478 found at Tue Nov 27 19:00:15 EST 2012
selfserv with PID 25478 started at Tue Nov 27 19:00:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2367: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 25478 >/dev/null 2>/dev/null
selfserv with PID 25478 found at Tue Nov 27 19:00:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2368: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 25478 >/dev/null 2>/dev/null
selfserv with PID 25478 found at Tue Nov 27 19:00:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2369: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 25478 >/dev/null 2>/dev/null
selfserv with PID 25478 found at Tue Nov 27 19:00:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2370: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 25478 >/dev/null 2>/dev/null
selfserv with PID 25478 found at Tue Nov 27 19:00:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2371: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 25478 at Tue Nov 27 19:00:15 EST 2012
kill -USR1 25478
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25478 killed at Tue Nov 27 19:00:15 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:00:15 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:15 EST 2012
selfserv with PID 25626 started at Tue Nov 27 19:00:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2372: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2373: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2374: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2375: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2376: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2377: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2378: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2379: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2380: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2381: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2382: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2383: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2384: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2385: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 25626 >/dev/null 2>/dev/null
selfserv with PID 25626 found at Tue Nov 27 19:00:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2386: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 25626 at Tue Nov 27 19:00:17 EST 2012
kill -USR1 25626
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25626 killed at Tue Nov 27 19:00:17 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:00:17 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26011 >/dev/null 2>/dev/null
selfserv with PID 26011 found at Tue Nov 27 19:00:17 EST 2012
selfserv with PID 26011 started at Tue Nov 27 19:00:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2387: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 26011 >/dev/null 2>/dev/null
selfserv with PID 26011 found at Tue Nov 27 19:00:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2388: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 26011 >/dev/null 2>/dev/null
selfserv with PID 26011 found at Tue Nov 27 19:00:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2389: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 26011 >/dev/null 2>/dev/null
selfserv with PID 26011 found at Tue Nov 27 19:00:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2390: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 26011 >/dev/null 2>/dev/null
selfserv with PID 26011 found at Tue Nov 27 19:00:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2391: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 26011 at Tue Nov 27 19:00:17 EST 2012
kill -USR1 26011
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26011 killed at Tue Nov 27 19:00:17 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:00:17 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26159 >/dev/null 2>/dev/null
selfserv with PID 26159 found at Tue Nov 27 19:00:17 EST 2012
selfserv with PID 26159 started at Tue Nov 27 19:00:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2392: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 26159 >/dev/null 2>/dev/null
selfserv with PID 26159 found at Tue Nov 27 19:00:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2393: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 26159 >/dev/null 2>/dev/null
selfserv with PID 26159 found at Tue Nov 27 19:00:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2394: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 26159 >/dev/null 2>/dev/null
selfserv with PID 26159 found at Tue Nov 27 19:00:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2395: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 26159 >/dev/null 2>/dev/null
selfserv with PID 26159 found at Tue Nov 27 19:00:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2396: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26159 at Tue Nov 27 19:00:18 EST 2012
kill -USR1 26159
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26159 killed at Tue Nov 27 19:00:18 EST 2012
ssl.sh: SSL Client Authentication Extended Test - server normal/client bypass  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:18 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26358 >/dev/null 2>/dev/null
selfserv with PID 26358 found at Tue Nov 27 19:00:18 EST 2012
selfserv with PID 26358 started at Tue Nov 27 19:00:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2397: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26358 at Tue Nov 27 19:00:18 EST 2012
kill -USR1 26358
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26358 killed at Tue Nov 27 19:00:18 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:00:18 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26415 >/dev/null 2>/dev/null
selfserv with PID 26415 found at Tue Nov 27 19:00:18 EST 2012
selfserv with PID 26415 started at Tue Nov 27 19:00:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2398: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26415 at Tue Nov 27 19:00:18 EST 2012
kill -USR1 26415
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26415 killed at Tue Nov 27 19:00:18 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:00:18 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26472 >/dev/null 2>/dev/null
selfserv with PID 26472 found at Tue Nov 27 19:00:18 EST 2012
selfserv with PID 26472 started at Tue Nov 27 19:00:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2399: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26472 at Tue Nov 27 19:00:19 EST 2012
kill -USR1 26472
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26472 killed at Tue Nov 27 19:00:19 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:19 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26529 >/dev/null 2>/dev/null
selfserv with PID 26529 found at Tue Nov 27 19:00:19 EST 2012
selfserv with PID 26529 started at Tue Nov 27 19:00:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2400: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26529 at Tue Nov 27 19:00:19 EST 2012
kill -USR1 26529
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26529 killed at Tue Nov 27 19:00:19 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:00:19 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26586 >/dev/null 2>/dev/null
selfserv with PID 26586 found at Tue Nov 27 19:00:19 EST 2012
selfserv with PID 26586 started at Tue Nov 27 19:00:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2401: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26586 at Tue Nov 27 19:00:19 EST 2012
kill -USR1 26586
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26586 killed at Tue Nov 27 19:00:19 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:00:19 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26643 >/dev/null 2>/dev/null
selfserv with PID 26643 found at Tue Nov 27 19:00:19 EST 2012
selfserv with PID 26643 started at Tue Nov 27 19:00:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2402: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26643 at Tue Nov 27 19:00:19 EST 2012
kill -USR1 26643
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26643 killed at Tue Nov 27 19:00:19 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:19 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26700 >/dev/null 2>/dev/null
selfserv with PID 26700 found at Tue Nov 27 19:00:19 EST 2012
selfserv with PID 26700 started at Tue Nov 27 19:00:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2403: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26700 at Tue Nov 27 19:00:20 EST 2012
kill -USR1 26700
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26700 killed at Tue Nov 27 19:00:20 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:00:20 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26757 >/dev/null 2>/dev/null
selfserv with PID 26757 found at Tue Nov 27 19:00:20 EST 2012
selfserv with PID 26757 started at Tue Nov 27 19:00:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2404: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26757 at Tue Nov 27 19:00:20 EST 2012
kill -USR1 26757
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26757 killed at Tue Nov 27 19:00:20 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:00:20 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26814 >/dev/null 2>/dev/null
selfserv with PID 26814 found at Tue Nov 27 19:00:20 EST 2012
selfserv with PID 26814 started at Tue Nov 27 19:00:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2405: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26814 at Tue Nov 27 19:00:20 EST 2012
kill -USR1 26814
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26814 killed at Tue Nov 27 19:00:20 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:20 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26871 >/dev/null 2>/dev/null
selfserv with PID 26871 found at Tue Nov 27 19:00:20 EST 2012
selfserv with PID 26871 started at Tue Nov 27 19:00:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2406: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26871 at Tue Nov 27 19:00:20 EST 2012
kill -USR1 26871
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26871 killed at Tue Nov 27 19:00:20 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:00:20 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26928 >/dev/null 2>/dev/null
selfserv with PID 26928 found at Tue Nov 27 19:00:20 EST 2012
selfserv with PID 26928 started at Tue Nov 27 19:00:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2407: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26928 at Tue Nov 27 19:00:20 EST 2012
kill -USR1 26928
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26928 killed at Tue Nov 27 19:00:20 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:00:20 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26985 >/dev/null 2>/dev/null
selfserv with PID 26985 found at Tue Nov 27 19:00:20 EST 2012
selfserv with PID 26985 started at Tue Nov 27 19:00:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2408: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26985 at Tue Nov 27 19:00:21 EST 2012
kill -USR1 26985
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26985 killed at Tue Nov 27 19:00:21 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:21 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27042 >/dev/null 2>/dev/null
selfserv with PID 27042 found at Tue Nov 27 19:00:21 EST 2012
selfserv with PID 27042 started at Tue Nov 27 19:00:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2409: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27042 at Tue Nov 27 19:00:21 EST 2012
kill -USR1 27042
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27042 killed at Tue Nov 27 19:00:21 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:00:21 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27099 >/dev/null 2>/dev/null
selfserv with PID 27099 found at Tue Nov 27 19:00:21 EST 2012
selfserv with PID 27099 started at Tue Nov 27 19:00:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2410: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27099 at Tue Nov 27 19:00:21 EST 2012
kill -USR1 27099
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27099 killed at Tue Nov 27 19:00:21 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:00:21 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27156 >/dev/null 2>/dev/null
selfserv with PID 27156 found at Tue Nov 27 19:00:21 EST 2012
selfserv with PID 27156 started at Tue Nov 27 19:00:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2411: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27156 at Tue Nov 27 19:00:21 EST 2012
kill -USR1 27156
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27156 killed at Tue Nov 27 19:00:21 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:21 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27214 >/dev/null 2>/dev/null
selfserv with PID 27214 found at Tue Nov 27 19:00:21 EST 2012
selfserv with PID 27214 started at Tue Nov 27 19:00:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2412: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27214 at Tue Nov 27 19:00:21 EST 2012
kill -USR1 27214
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27214 killed at Tue Nov 27 19:00:21 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:00:21 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27271 >/dev/null 2>/dev/null
selfserv with PID 27271 found at Tue Nov 27 19:00:22 EST 2012
selfserv with PID 27271 started at Tue Nov 27 19:00:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2413: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27271 at Tue Nov 27 19:00:22 EST 2012
kill -USR1 27271
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27271 killed at Tue Nov 27 19:00:22 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:00:22 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27328 >/dev/null 2>/dev/null
selfserv with PID 27328 found at Tue Nov 27 19:00:22 EST 2012
selfserv with PID 27328 started at Tue Nov 27 19:00:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2414: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27328 at Tue Nov 27 19:00:22 EST 2012
kill -USR1 27328
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27328 killed at Tue Nov 27 19:00:22 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:22 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27385 >/dev/null 2>/dev/null
selfserv with PID 27385 found at Tue Nov 27 19:00:22 EST 2012
selfserv with PID 27385 started at Tue Nov 27 19:00:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2415: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27385 at Tue Nov 27 19:00:22 EST 2012
kill -USR1 27385
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27385 killed at Tue Nov 27 19:00:22 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:00:22 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27442 >/dev/null 2>/dev/null
selfserv with PID 27442 found at Tue Nov 27 19:00:22 EST 2012
selfserv with PID 27442 started at Tue Nov 27 19:00:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2416: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27442 at Tue Nov 27 19:00:22 EST 2012
kill -USR1 27442
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27442 killed at Tue Nov 27 19:00:22 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:00:22 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27499 >/dev/null 2>/dev/null
selfserv with PID 27499 found at Tue Nov 27 19:00:22 EST 2012
selfserv with PID 27499 started at Tue Nov 27 19:00:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2417: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27499 at Tue Nov 27 19:00:23 EST 2012
kill -USR1 27499
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27499 killed at Tue Nov 27 19:00:23 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:23 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27556 >/dev/null 2>/dev/null
selfserv with PID 27556 found at Tue Nov 27 19:00:23 EST 2012
selfserv with PID 27556 started at Tue Nov 27 19:00:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2418: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27556 at Tue Nov 27 19:00:23 EST 2012
kill -USR1 27556
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27556 killed at Tue Nov 27 19:00:23 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:00:23 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27613 >/dev/null 2>/dev/null
selfserv with PID 27613 found at Tue Nov 27 19:00:23 EST 2012
selfserv with PID 27613 started at Tue Nov 27 19:00:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2419: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27613 at Tue Nov 27 19:00:23 EST 2012
kill -USR1 27613
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27613 killed at Tue Nov 27 19:00:23 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:00:23 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27670 >/dev/null 2>/dev/null
selfserv with PID 27670 found at Tue Nov 27 19:00:23 EST 2012
selfserv with PID 27670 started at Tue Nov 27 19:00:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2420: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27670 at Tue Nov 27 19:00:23 EST 2012
kill -USR1 27670
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27670 killed at Tue Nov 27 19:00:23 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:23 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27727 >/dev/null 2>/dev/null
selfserv with PID 27727 found at Tue Nov 27 19:00:23 EST 2012
selfserv with PID 27727 started at Tue Nov 27 19:00:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2421: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27727 at Tue Nov 27 19:00:23 EST 2012
kill -USR1 27727
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27727 killed at Tue Nov 27 19:00:23 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:00:23 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27784 >/dev/null 2>/dev/null
selfserv with PID 27784 found at Tue Nov 27 19:00:23 EST 2012
selfserv with PID 27784 started at Tue Nov 27 19:00:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2422: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27784 at Tue Nov 27 19:00:24 EST 2012
kill -USR1 27784
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27784 killed at Tue Nov 27 19:00:24 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:00:24 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27841 >/dev/null 2>/dev/null
selfserv with PID 27841 found at Tue Nov 27 19:00:24 EST 2012
selfserv with PID 27841 started at Tue Nov 27 19:00:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2423: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27841 at Tue Nov 27 19:00:24 EST 2012
kill -USR1 27841
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27841 killed at Tue Nov 27 19:00:24 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:24 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27898 >/dev/null 2>/dev/null
selfserv with PID 27898 found at Tue Nov 27 19:00:24 EST 2012
selfserv with PID 27898 started at Tue Nov 27 19:00:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2424: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27898 at Tue Nov 27 19:00:24 EST 2012
kill -USR1 27898
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27898 killed at Tue Nov 27 19:00:24 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:00:24 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27955 >/dev/null 2>/dev/null
selfserv with PID 27955 found at Tue Nov 27 19:00:24 EST 2012
selfserv with PID 27955 started at Tue Nov 27 19:00:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2425: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27955 at Tue Nov 27 19:00:24 EST 2012
kill -USR1 27955
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27955 killed at Tue Nov 27 19:00:24 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:00:24 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28012 >/dev/null 2>/dev/null
selfserv with PID 28012 found at Tue Nov 27 19:00:24 EST 2012
selfserv with PID 28012 started at Tue Nov 27 19:00:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2426: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28012 at Tue Nov 27 19:00:25 EST 2012
kill -USR1 28012
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28012 killed at Tue Nov 27 19:00:25 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:00:25 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28084 >/dev/null 2>/dev/null
selfserv with PID 28084 found at Tue Nov 27 19:00:25 EST 2012
selfserv with PID 28084 started at Tue Nov 27 19:00:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2427: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28084 at Tue Nov 27 19:00:25 EST 2012
kill -USR1 28084
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28084 killed at Tue Nov 27 19:00:25 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:00:25 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28141 >/dev/null 2>/dev/null
selfserv with PID 28141 found at Tue Nov 27 19:00:25 EST 2012
selfserv with PID 28141 started at Tue Nov 27 19:00:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2428: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28141 at Tue Nov 27 19:00:25 EST 2012
kill -USR1 28141
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28141 killed at Tue Nov 27 19:00:25 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:00:25 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28198 >/dev/null 2>/dev/null
selfserv with PID 28198 found at Tue Nov 27 19:00:25 EST 2012
selfserv with PID 28198 started at Tue Nov 27 19:00:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2429: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28198 at Tue Nov 27 19:00:25 EST 2012
kill -USR1 28198
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28198 killed at Tue Nov 27 19:00:25 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:00:25 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28255 >/dev/null 2>/dev/null
selfserv with PID 28255 found at Tue Nov 27 19:00:25 EST 2012
selfserv with PID 28255 started at Tue Nov 27 19:00:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2430: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28255 at Tue Nov 27 19:00:25 EST 2012
kill -USR1 28255
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28255 killed at Tue Nov 27 19:00:25 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:00:26 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28312 >/dev/null 2>/dev/null
selfserv with PID 28312 found at Tue Nov 27 19:00:26 EST 2012
selfserv with PID 28312 started at Tue Nov 27 19:00:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2431: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28312 at Tue Nov 27 19:00:26 EST 2012
kill -USR1 28312
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28312 killed at Tue Nov 27 19:00:26 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:00:26 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28369 >/dev/null 2>/dev/null
selfserv with PID 28369 found at Tue Nov 27 19:00:26 EST 2012
selfserv with PID 28369 started at Tue Nov 27 19:00:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2432: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28369 at Tue Nov 27 19:00:26 EST 2012
kill -USR1 28369
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28369 killed at Tue Nov 27 19:00:26 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:00:26 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28426 >/dev/null 2>/dev/null
selfserv with PID 28426 found at Tue Nov 27 19:00:26 EST 2012
selfserv with PID 28426 started at Tue Nov 27 19:00:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2433: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28426 at Tue Nov 27 19:00:26 EST 2012
kill -USR1 28426
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28426 killed at Tue Nov 27 19:00:26 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:00:26 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28483 >/dev/null 2>/dev/null
selfserv with PID 28483 found at Tue Nov 27 19:00:26 EST 2012
selfserv with PID 28483 started at Tue Nov 27 19:00:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2434: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28483 at Tue Nov 27 19:00:26 EST 2012
kill -USR1 28483
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28483 killed at Tue Nov 27 19:00:26 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:00:26 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28540 >/dev/null 2>/dev/null
selfserv with PID 28540 found at Tue Nov 27 19:00:26 EST 2012
selfserv with PID 28540 started at Tue Nov 27 19:00:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2435: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28540 at Tue Nov 27 19:00:27 EST 2012
kill -USR1 28540
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28540 killed at Tue Nov 27 19:00:27 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:00:27 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28597 >/dev/null 2>/dev/null
selfserv with PID 28597 found at Tue Nov 27 19:00:27 EST 2012
selfserv with PID 28597 started at Tue Nov 27 19:00:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2436: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28597 at Tue Nov 27 19:00:27 EST 2012
kill -USR1 28597
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28597 killed at Tue Nov 27 19:00:27 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:00:27 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28654 >/dev/null 2>/dev/null
selfserv with PID 28654 found at Tue Nov 27 19:00:27 EST 2012
selfserv with PID 28654 started at Tue Nov 27 19:00:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2437: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28654 at Tue Nov 27 19:00:27 EST 2012
kill -USR1 28654
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28654 killed at Tue Nov 27 19:00:27 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:00:27 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28711 >/dev/null 2>/dev/null
selfserv with PID 28711 found at Tue Nov 27 19:00:27 EST 2012
selfserv with PID 28711 started at Tue Nov 27 19:00:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2438: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28711 at Tue Nov 27 19:00:27 EST 2012
kill -USR1 28711
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28711 killed at Tue Nov 27 19:00:27 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:00:27 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28768 >/dev/null 2>/dev/null
selfserv with PID 28768 found at Tue Nov 27 19:00:27 EST 2012
selfserv with PID 28768 started at Tue Nov 27 19:00:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2439: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28768 at Tue Nov 27 19:00:28 EST 2012
kill -USR1 28768
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28768 killed at Tue Nov 27 19:00:28 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:00:28 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28826 >/dev/null 2>/dev/null
selfserv with PID 28826 found at Tue Nov 27 19:00:28 EST 2012
selfserv with PID 28826 started at Tue Nov 27 19:00:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2440: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28826 at Tue Nov 27 19:00:28 EST 2012
kill -USR1 28826
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28826 killed at Tue Nov 27 19:00:28 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:00:28 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28883 >/dev/null 2>/dev/null
selfserv with PID 28883 found at Tue Nov 27 19:00:28 EST 2012
selfserv with PID 28883 started at Tue Nov 27 19:00:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2441: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28883 at Tue Nov 27 19:00:28 EST 2012
kill -USR1 28883
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28883 killed at Tue Nov 27 19:00:28 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:00:28 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28940 >/dev/null 2>/dev/null
selfserv with PID 28940 found at Tue Nov 27 19:00:28 EST 2012
selfserv with PID 28940 started at Tue Nov 27 19:00:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2442: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28940 at Tue Nov 27 19:00:28 EST 2012
kill -USR1 28940
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28940 killed at Tue Nov 27 19:00:28 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:00:28 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28997 >/dev/null 2>/dev/null
selfserv with PID 28997 found at Tue Nov 27 19:00:28 EST 2012
selfserv with PID 28997 started at Tue Nov 27 19:00:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2443: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28997 at Tue Nov 27 19:00:29 EST 2012
kill -USR1 28997
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28997 killed at Tue Nov 27 19:00:29 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:00:29 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29054 >/dev/null 2>/dev/null
selfserv with PID 29054 found at Tue Nov 27 19:00:29 EST 2012
selfserv with PID 29054 started at Tue Nov 27 19:00:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2444: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29054 at Tue Nov 27 19:00:29 EST 2012
kill -USR1 29054
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29054 killed at Tue Nov 27 19:00:29 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:00:29 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29111 >/dev/null 2>/dev/null
selfserv with PID 29111 found at Tue Nov 27 19:00:29 EST 2012
selfserv with PID 29111 started at Tue Nov 27 19:00:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2445: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29111 at Tue Nov 27 19:00:29 EST 2012
kill -USR1 29111
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29111 killed at Tue Nov 27 19:00:29 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:00:29 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29168 >/dev/null 2>/dev/null
selfserv with PID 29168 found at Tue Nov 27 19:00:29 EST 2012
selfserv with PID 29168 started at Tue Nov 27 19:00:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2446: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29168 at Tue Nov 27 19:00:29 EST 2012
kill -USR1 29168
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29168 killed at Tue Nov 27 19:00:29 EST 2012
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: SSL Stress Test Extended Test - server normal/client bypass  - with ECC ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:00:30 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29339 >/dev/null 2>/dev/null
selfserv with PID 29339 found at Tue Nov 27 19:00:30 EST 2012
selfserv with PID 29339 started at Tue Nov 27 19:00:30 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 1000 -C c -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:30 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:30 EST 2012
ssl.sh: #2447: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29339 at Tue Nov 27 19:00:30 EST 2012
kill -USR1 29339
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29339 killed at Tue Nov 27 19:00:30 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:00:30 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29415 >/dev/null 2>/dev/null
selfserv with PID 29415 found at Tue Nov 27 19:00:30 EST 2012
selfserv with PID 29415 started at Tue Nov 27 19:00:30 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 1000 -C c \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:30 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:30 EST 2012
ssl.sh: #2448: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29415 at Tue Nov 27 19:00:30 EST 2012
kill -USR1 29415
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29415 killed at Tue Nov 27 19:00:30 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 19:00:30 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29491 >/dev/null 2>/dev/null
selfserv with PID 29491 found at Tue Nov 27 19:00:30 EST 2012
selfserv with PID 29491 started at Tue Nov 27 19:00:30 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 1000 -C c -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:30 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:31 EST 2012
ssl.sh: #2449: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29491 at Tue Nov 27 19:00:31 EST 2012
kill -USR1 29491
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29491 killed at Tue Nov 27 19:00:31 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 19:00:31 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29567 >/dev/null 2>/dev/null
selfserv with PID 29567 found at Tue Nov 27 19:00:31 EST 2012
selfserv with PID 29567 started at Tue Nov 27 19:00:31 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:31 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:00:31 EST 2012
ssl.sh: #2450: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29567 at Tue Nov 27 19:00:31 EST 2012
kill -USR1 29567
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29567 killed at Tue Nov 27 19:00:31 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 19:00:31 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29643 >/dev/null 2>/dev/null
selfserv with PID 29643 found at Tue Nov 27 19:00:31 EST 2012
selfserv with PID 29643 started at Tue Nov 27 19:00:31 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:31 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:32 EST 2012
ssl.sh: #2451: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29643 at Tue Nov 27 19:00:32 EST 2012
kill -USR1 29643
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29643 killed at Tue Nov 27 19:00:32 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 19:00:32 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29719 >/dev/null 2>/dev/null
selfserv with PID 29719 found at Tue Nov 27 19:00:32 EST 2012
selfserv with PID 29719 started at Tue Nov 27 19:00:32 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:32 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:00:32 EST 2012
ssl.sh: #2452: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29719 at Tue Nov 27 19:00:32 EST 2012
kill -USR1 29719
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29719 killed at Tue Nov 27 19:00:32 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 19:00:32 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29795 >/dev/null 2>/dev/null
selfserv with PID 29795 found at Tue Nov 27 19:00:32 EST 2012
selfserv with PID 29795 started at Tue Nov 27 19:00:32 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:32 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:00:33 EST 2012
ssl.sh: #2453: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29795 at Tue Nov 27 19:00:33 EST 2012
kill -USR1 29795
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29795 killed at Tue Nov 27 19:00:33 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:00:33 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29900 >/dev/null 2>/dev/null
selfserv with PID 29900 found at Tue Nov 27 19:00:33 EST 2012
selfserv with PID 29900 started at Tue Nov 27 19:00:33 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:33 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:34 EST 2012
ssl.sh: #2454: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29900 at Tue Nov 27 19:00:34 EST 2012
kill -USR1 29900
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29900 killed at Tue Nov 27 19:00:34 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:00:34 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29975 >/dev/null 2>/dev/null
selfserv with PID 29975 found at Tue Nov 27 19:00:34 EST 2012
selfserv with PID 29975 started at Tue Nov 27 19:00:34 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:34 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:34 EST 2012
ssl.sh: #2455: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29975 at Tue Nov 27 19:00:35 EST 2012
kill -USR1 29975
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29975 killed at Tue Nov 27 19:00:35 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:00:35 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30050 >/dev/null 2>/dev/null
selfserv with PID 30050 found at Tue Nov 27 19:00:35 EST 2012
selfserv with PID 30050 started at Tue Nov 27 19:00:35 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:35 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:00:35 EST 2012
ssl.sh: #2456: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30050 at Tue Nov 27 19:00:35 EST 2012
kill -USR1 30050
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30050 killed at Tue Nov 27 19:00:35 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 19:00:35 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30126 >/dev/null 2>/dev/null
selfserv with PID 30126 found at Tue Nov 27 19:00:35 EST 2012
selfserv with PID 30126 started at Tue Nov 27 19:00:35 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:35 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:35 EST 2012
ssl.sh: #2457: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30126 at Tue Nov 27 19:00:35 EST 2012
kill -USR1 30126
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30126 killed at Tue Nov 27 19:00:35 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:00:35 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30202 >/dev/null 2>/dev/null
selfserv with PID 30202 found at Tue Nov 27 19:00:35 EST 2012
selfserv with PID 30202 started at Tue Nov 27 19:00:35 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:35 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:35 EST 2012
ssl.sh: #2458: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30202 at Tue Nov 27 19:00:35 EST 2012
kill -USR1 30202
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30202 killed at Tue Nov 27 19:00:35 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 19:00:35 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30278 >/dev/null 2>/dev/null
selfserv with PID 30278 found at Tue Nov 27 19:00:35 EST 2012
selfserv with PID 30278 started at Tue Nov 27 19:00:36 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:36 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:00:36 EST 2012
ssl.sh: #2459: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30278 at Tue Nov 27 19:00:36 EST 2012
kill -USR1 30278
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30278 killed at Tue Nov 27 19:00:36 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:00:36 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30355 >/dev/null 2>/dev/null
selfserv with PID 30355 found at Tue Nov 27 19:00:36 EST 2012
selfserv with PID 30355 started at Tue Nov 27 19:00:36 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:36 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:00:36 EST 2012
ssl.sh: #2460: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30355 at Tue Nov 27 19:00:36 EST 2012
kill -USR1 30355
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30355 killed at Tue Nov 27 19:00:36 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:00:36 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30460 >/dev/null 2>/dev/null
selfserv with PID 30460 found at Tue Nov 27 19:00:36 EST 2012
selfserv with PID 30460 started at Tue Nov 27 19:00:36 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:36 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:37 EST 2012
ssl.sh: #2461: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30460 at Tue Nov 27 19:00:37 EST 2012
kill -USR1 30460
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30460 killed at Tue Nov 27 19:00:37 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:00:37 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30535 >/dev/null 2>/dev/null
selfserv with PID 30535 found at Tue Nov 27 19:00:37 EST 2012
selfserv with PID 30535 started at Tue Nov 27 19:00:37 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:37 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:38 EST 2012
ssl.sh: #2462: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30535 at Tue Nov 27 19:00:38 EST 2012
kill -USR1 30535
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30535 killed at Tue Nov 27 19:00:38 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:00:38 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30611 >/dev/null 2>/dev/null
selfserv with PID 30611 found at Tue Nov 27 19:00:38 EST 2012
selfserv with PID 30611 started at Tue Nov 27 19:00:38 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:38 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:39 EST 2012
ssl.sh: #2463: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30611 at Tue Nov 27 19:00:39 EST 2012
kill -USR1 30611
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30611 killed at Tue Nov 27 19:00:39 EST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:00:39 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30686 >/dev/null 2>/dev/null
selfserv with PID 30686 found at Tue Nov 27 19:00:39 EST 2012
selfserv with PID 30686 started at Tue Nov 27 19:00:39 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:39 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:39 EST 2012
ssl.sh: #2464: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30686 at Tue Nov 27 19:00:39 EST 2012
kill -USR1 30686
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30686 killed at Tue Nov 27 19:00:39 EST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:00:40 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30761 >/dev/null 2>/dev/null
selfserv with PID 30761 found at Tue Nov 27 19:00:40 EST 2012
selfserv with PID 30761 started at Tue Nov 27 19:00:40 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:40 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:40 EST 2012
ssl.sh: #2465: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30761 at Tue Nov 27 19:00:40 EST 2012
kill -USR1 30761
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30761 killed at Tue Nov 27 19:00:40 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 19:00:40 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30837 >/dev/null 2>/dev/null
selfserv with PID 30837 found at Tue Nov 27 19:00:40 EST 2012
selfserv with PID 30837 started at Tue Nov 27 19:00:40 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:40 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:00:40 EST 2012
ssl.sh: #2466: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30837 at Tue Nov 27 19:00:40 EST 2012
kill -USR1 30837
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30837 killed at Tue Nov 27 19:00:40 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:00:41 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30934 >/dev/null 2>/dev/null
selfserv with PID 30934 found at Tue Nov 27 19:00:41 EST 2012
selfserv with PID 30934 started at Tue Nov 27 19:00:41 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:41 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:41 EST 2012
ssl.sh: #2467: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 30934 at Tue Nov 27 19:00:41 EST 2012
kill -USR1 30934
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30934 killed at Tue Nov 27 19:00:41 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 19:00:41 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31009 >/dev/null 2>/dev/null
selfserv with PID 31009 found at Tue Nov 27 19:00:41 EST 2012
selfserv with PID 31009 started at Tue Nov 27 19:00:41 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:41 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:41 EST 2012
ssl.sh: #2468: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31009 at Tue Nov 27 19:00:41 EST 2012
kill -USR1 31009
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31009 killed at Tue Nov 27 19:00:41 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:00:41 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31085 >/dev/null 2>/dev/null
selfserv with PID 31085 found at Tue Nov 27 19:00:41 EST 2012
selfserv with PID 31085 started at Tue Nov 27 19:00:41 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:41 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:42 EST 2012
ssl.sh: #2469: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31085 at Tue Nov 27 19:00:42 EST 2012
kill -USR1 31085
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31085 killed at Tue Nov 27 19:00:42 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:00:42 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31160 >/dev/null 2>/dev/null
selfserv with PID 31160 found at Tue Nov 27 19:00:42 EST 2012
selfserv with PID 31160 started at Tue Nov 27 19:00:42 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:42 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:00:42 EST 2012
ssl.sh: #2470: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31160 at Tue Nov 27 19:00:42 EST 2012
kill -USR1 31160
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31160 killed at Tue Nov 27 19:00:42 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 19:00:42 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31235 >/dev/null 2>/dev/null
selfserv with PID 31235 found at Tue Nov 27 19:00:42 EST 2012
selfserv with PID 31235 started at Tue Nov 27 19:00:42 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:42 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:00:42 EST 2012
ssl.sh: #2471: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31235 at Tue Nov 27 19:00:42 EST 2012
kill -USR1 31235
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31235 killed at Tue Nov 27 19:00:42 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:00:42 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31311 >/dev/null 2>/dev/null
selfserv with PID 31311 found at Tue Nov 27 19:00:42 EST 2012
selfserv with PID 31311 started at Tue Nov 27 19:00:42 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:00:42 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:00:43 EST 2012
ssl.sh: #2472: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 31311 at Tue Nov 27 19:00:43 EST 2012
kill -USR1 31311
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31311 killed at Tue Nov 27 19:00:43 EST 2012
ssl.sh: SSL - FIPS mode on for server ===============================
ssl.sh: Turning FIPS on for the  server
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -fips true -force
FIPS mode enabled.
ssl.sh: #2473:  (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -list
ssl.sh: #2474:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
  1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #2475:  (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: Turning FIPS on for the extended  server
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -fips true -force
FIPS mode enabled.
ssl.sh: #2476:  (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -list
ssl.sh: #2477:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
  1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #2478:  (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: SSL Cipher Coverage  - server fips/client normal  - with ECC ===============================
selfserv starting at Tue Nov 27 19:00:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
selfserv with PID 31442 started at Tue Nov 27 19:00:44 EST 2012
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2479: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2480: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2481: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2482: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2483: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2484: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2485: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2486: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2487: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2488: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2489: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2490: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2491: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2492: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2493: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2494: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2495: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2496: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2497: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2498: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2499: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2500: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2501: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  f    TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  g    TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2502: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2503: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2504: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2505: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2506: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2507: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2508: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2509: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2510: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2511: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2512: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2513: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2514: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2515: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2516: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2517: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31442 >/dev/null 2>/dev/null
selfserv with PID 31442 found at Tue Nov 27 19:00:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2518: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 31442 at Tue Nov 27 19:00:46 EST 2012
kill -USR1 31442
selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31442 killed at Tue Nov 27 19:00:46 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:00:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32666 >/dev/null 2>/dev/null
selfserv with PID 32666 found at Tue Nov 27 19:00:47 EST 2012
selfserv with PID 32666 started at Tue Nov 27 19:00:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2519: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32666 >/dev/null 2>/dev/null
selfserv with PID 32666 found at Tue Nov 27 19:00:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2520: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32666 >/dev/null 2>/dev/null
selfserv with PID 32666 found at Tue Nov 27 19:00:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2521: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32666 >/dev/null 2>/dev/null
selfserv with PID 32666 found at Tue Nov 27 19:00:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2522: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32666 >/dev/null 2>/dev/null
selfserv with PID 32666 found at Tue Nov 27 19:00:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2523: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 32666 at Tue Nov 27 19:00:47 EST 2012
kill -USR1 32666
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32666 killed at Tue Nov 27 19:00:47 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:00:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:47 EST 2012
selfserv with PID 351 started at Tue Nov 27 19:00:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2524: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2525: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2526: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2527: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2528: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2529: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2530: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2531: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2532: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2533: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2534: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2535: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2536: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2537: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 351 >/dev/null 2>/dev/null
selfserv with PID 351 found at Tue Nov 27 19:00:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2538: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 351 at Tue Nov 27 19:00:49 EST 2012
kill -USR1 351
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 351 killed at Tue Nov 27 19:00:49 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:00:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 803 >/dev/null 2>/dev/null
selfserv with PID 803 found at Tue Nov 27 19:00:49 EST 2012
selfserv with PID 803 started at Tue Nov 27 19:00:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2539: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 803 >/dev/null 2>/dev/null
selfserv with PID 803 found at Tue Nov 27 19:00:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2540: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 803 >/dev/null 2>/dev/null
selfserv with PID 803 found at Tue Nov 27 19:00:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2541: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 803 >/dev/null 2>/dev/null
selfserv with PID 803 found at Tue Nov 27 19:00:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2542: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 803 >/dev/null 2>/dev/null
selfserv with PID 803 found at Tue Nov 27 19:00:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2543: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 803 at Tue Nov 27 19:00:49 EST 2012
kill -USR1 803
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 803 killed at Tue Nov 27 19:00:49 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:00:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:49 EST 2012
selfserv with PID 1007 started at Tue Nov 27 19:00:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2544: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2545: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2546: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2547: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2548: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2549: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2550: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2551: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2552: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2553: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2554: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2555: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2556: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2557: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 1007 >/dev/null 2>/dev/null
selfserv with PID 1007 found at Tue Nov 27 19:00:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2558: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 1007 at Tue Nov 27 19:00:51 EST 2012
kill -USR1 1007
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1007 killed at Tue Nov 27 19:00:51 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:00:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1392 >/dev/null 2>/dev/null
selfserv with PID 1392 found at Tue Nov 27 19:00:51 EST 2012
selfserv with PID 1392 started at Tue Nov 27 19:00:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2559: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 1392 >/dev/null 2>/dev/null
selfserv with PID 1392 found at Tue Nov 27 19:00:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2560: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1392 >/dev/null 2>/dev/null
selfserv with PID 1392 found at Tue Nov 27 19:00:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2561: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 1392 >/dev/null 2>/dev/null
selfserv with PID 1392 found at Tue Nov 27 19:00:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2562: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 1392 >/dev/null 2>/dev/null
selfserv with PID 1392 found at Tue Nov 27 19:00:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2563: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 1392 at Tue Nov 27 19:00:52 EST 2012
kill -USR1 1392
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1392 killed at Tue Nov 27 19:00:52 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:00:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1541 >/dev/null 2>/dev/null
selfserv with PID 1541 found at Tue Nov 27 19:00:52 EST 2012
selfserv with PID 1541 started at Tue Nov 27 19:00:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2564: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 1541 >/dev/null 2>/dev/null
selfserv with PID 1541 found at Tue Nov 27 19:00:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2565: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 1541 >/dev/null 2>/dev/null
selfserv with PID 1541 found at Tue Nov 27 19:00:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2566: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 1541 >/dev/null 2>/dev/null
selfserv with PID 1541 found at Tue Nov 27 19:00:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2567: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 1541 >/dev/null 2>/dev/null
selfserv with PID 1541 found at Tue Nov 27 19:00:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2568: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1541 at Tue Nov 27 19:00:52 EST 2012
kill -USR1 1541
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1541 killed at Tue Nov 27 19:00:52 EST 2012
ssl.sh: SSL Client Authentication  - server fips/client normal  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1740 >/dev/null 2>/dev/null
selfserv with PID 1740 found at Tue Nov 27 19:00:52 EST 2012
selfserv with PID 1740 started at Tue Nov 27 19:00:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2569: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1740 at Tue Nov 27 19:00:53 EST 2012
kill -USR1 1740
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1740 killed at Tue Nov 27 19:00:53 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:00:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1797 >/dev/null 2>/dev/null
selfserv with PID 1797 found at Tue Nov 27 19:00:53 EST 2012
selfserv with PID 1797 started at Tue Nov 27 19:00:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2570: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1797 at Tue Nov 27 19:00:53 EST 2012
kill -USR1 1797
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1797 killed at Tue Nov 27 19:00:53 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:00:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1854 >/dev/null 2>/dev/null
selfserv with PID 1854 found at Tue Nov 27 19:00:53 EST 2012
selfserv with PID 1854 started at Tue Nov 27 19:00:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2571: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1854 at Tue Nov 27 19:00:53 EST 2012
kill -USR1 1854
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1854 killed at Tue Nov 27 19:00:53 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1911 >/dev/null 2>/dev/null
selfserv with PID 1911 found at Tue Nov 27 19:00:53 EST 2012
selfserv with PID 1911 started at Tue Nov 27 19:00:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2572: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1911 at Tue Nov 27 19:00:54 EST 2012
kill -USR1 1911
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1911 killed at Tue Nov 27 19:00:54 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:00:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1968 >/dev/null 2>/dev/null
selfserv with PID 1968 found at Tue Nov 27 19:00:54 EST 2012
selfserv with PID 1968 started at Tue Nov 27 19:00:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2573: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1968 at Tue Nov 27 19:00:54 EST 2012
kill -USR1 1968
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1968 killed at Tue Nov 27 19:00:54 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:00:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2025 >/dev/null 2>/dev/null
selfserv with PID 2025 found at Tue Nov 27 19:00:54 EST 2012
selfserv with PID 2025 started at Tue Nov 27 19:00:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n TestUser   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2574: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2025 at Tue Nov 27 19:00:54 EST 2012
kill -USR1 2025
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2025 killed at Tue Nov 27 19:00:54 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2082 >/dev/null 2>/dev/null
selfserv with PID 2082 found at Tue Nov 27 19:00:54 EST 2012
selfserv with PID 2082 started at Tue Nov 27 19:00:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2575: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2082 at Tue Nov 27 19:00:55 EST 2012
kill -USR1 2082
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2082 killed at Tue Nov 27 19:00:55 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:00:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2139 >/dev/null 2>/dev/null
selfserv with PID 2139 found at Tue Nov 27 19:00:55 EST 2012
selfserv with PID 2139 started at Tue Nov 27 19:00:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2576: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2139 at Tue Nov 27 19:00:55 EST 2012
kill -USR1 2139
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2139 killed at Tue Nov 27 19:00:55 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:00:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2197 >/dev/null 2>/dev/null
selfserv with PID 2197 found at Tue Nov 27 19:00:55 EST 2012
selfserv with PID 2197 started at Tue Nov 27 19:00:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2577: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2197 at Tue Nov 27 19:00:55 EST 2012
kill -USR1 2197
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2197 killed at Tue Nov 27 19:00:55 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2254 >/dev/null 2>/dev/null
selfserv with PID 2254 found at Tue Nov 27 19:00:55 EST 2012
selfserv with PID 2254 started at Tue Nov 27 19:00:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2578: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2254 at Tue Nov 27 19:00:55 EST 2012
kill -USR1 2254
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2254 killed at Tue Nov 27 19:00:55 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:00:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2311 >/dev/null 2>/dev/null
selfserv with PID 2311 found at Tue Nov 27 19:00:56 EST 2012
selfserv with PID 2311 started at Tue Nov 27 19:00:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2579: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2311 at Tue Nov 27 19:00:56 EST 2012
kill -USR1 2311
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2311 killed at Tue Nov 27 19:00:56 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:00:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2368 >/dev/null 2>/dev/null
selfserv with PID 2368 found at Tue Nov 27 19:00:56 EST 2012
selfserv with PID 2368 started at Tue Nov 27 19:00:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2580: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2368 at Tue Nov 27 19:00:56 EST 2012
kill -USR1 2368
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2368 killed at Tue Nov 27 19:00:56 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2425 >/dev/null 2>/dev/null
selfserv with PID 2425 found at Tue Nov 27 19:00:56 EST 2012
selfserv with PID 2425 started at Tue Nov 27 19:00:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2581: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2425 at Tue Nov 27 19:00:56 EST 2012
kill -USR1 2425
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2425 killed at Tue Nov 27 19:00:56 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:00:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2482 >/dev/null 2>/dev/null
selfserv with PID 2482 found at Tue Nov 27 19:00:56 EST 2012
selfserv with PID 2482 started at Tue Nov 27 19:00:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2582: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2482 at Tue Nov 27 19:00:57 EST 2012
kill -USR1 2482
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2482 killed at Tue Nov 27 19:00:57 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:00:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2539 >/dev/null 2>/dev/null
selfserv with PID 2539 found at Tue Nov 27 19:00:57 EST 2012
selfserv with PID 2539 started at Tue Nov 27 19:00:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2583: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2539 at Tue Nov 27 19:00:57 EST 2012
kill -USR1 2539
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2539 killed at Tue Nov 27 19:00:57 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2596 >/dev/null 2>/dev/null
selfserv with PID 2596 found at Tue Nov 27 19:00:57 EST 2012
selfserv with PID 2596 started at Tue Nov 27 19:00:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2584: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2596 at Tue Nov 27 19:00:57 EST 2012
kill -USR1 2596
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2596 killed at Tue Nov 27 19:00:57 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:00:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2653 >/dev/null 2>/dev/null
selfserv with PID 2653 found at Tue Nov 27 19:00:57 EST 2012
selfserv with PID 2653 started at Tue Nov 27 19:00:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2585: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2653 at Tue Nov 27 19:00:58 EST 2012
kill -USR1 2653
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2653 killed at Tue Nov 27 19:00:58 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:00:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2711 >/dev/null 2>/dev/null
selfserv with PID 2711 found at Tue Nov 27 19:00:58 EST 2012
selfserv with PID 2711 started at Tue Nov 27 19:00:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2586: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2711 at Tue Nov 27 19:00:58 EST 2012
kill -USR1 2711
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2711 killed at Tue Nov 27 19:00:58 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2768 >/dev/null 2>/dev/null
selfserv with PID 2768 found at Tue Nov 27 19:00:58 EST 2012
selfserv with PID 2768 started at Tue Nov 27 19:00:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2587: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2768 at Tue Nov 27 19:00:58 EST 2012
kill -USR1 2768
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2768 killed at Tue Nov 27 19:00:58 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:00:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2825 >/dev/null 2>/dev/null
selfserv with PID 2825 found at Tue Nov 27 19:00:58 EST 2012
selfserv with PID 2825 started at Tue Nov 27 19:00:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2588: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2825 at Tue Nov 27 19:00:59 EST 2012
kill -USR1 2825
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2825 killed at Tue Nov 27 19:00:59 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:00:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2882 >/dev/null 2>/dev/null
selfserv with PID 2882 found at Tue Nov 27 19:00:59 EST 2012
selfserv with PID 2882 started at Tue Nov 27 19:00:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2589: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2882 at Tue Nov 27 19:00:59 EST 2012
kill -USR1 2882
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2882 killed at Tue Nov 27 19:00:59 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:00:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2939 >/dev/null 2>/dev/null
selfserv with PID 2939 found at Tue Nov 27 19:00:59 EST 2012
selfserv with PID 2939 started at Tue Nov 27 19:00:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2590: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2939 at Tue Nov 27 19:00:59 EST 2012
kill -USR1 2939
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2939 killed at Tue Nov 27 19:00:59 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:00:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:00:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2996 >/dev/null 2>/dev/null
selfserv with PID 2996 found at Tue Nov 27 19:00:59 EST 2012
selfserv with PID 2996 started at Tue Nov 27 19:00:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2591: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2996 at Tue Nov 27 19:01:00 EST 2012
kill -USR1 2996
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2996 killed at Tue Nov 27 19:01:00 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:01:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3053 >/dev/null 2>/dev/null
selfserv with PID 3053 found at Tue Nov 27 19:01:00 EST 2012
selfserv with PID 3053 started at Tue Nov 27 19:01:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2592: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3053 at Tue Nov 27 19:01:00 EST 2012
kill -USR1 3053
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3053 killed at Tue Nov 27 19:01:00 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:01:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3110 >/dev/null 2>/dev/null
selfserv with PID 3110 found at Tue Nov 27 19:01:00 EST 2012
selfserv with PID 3110 started at Tue Nov 27 19:01:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2593: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3110 at Tue Nov 27 19:01:00 EST 2012
kill -USR1 3110
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3110 killed at Tue Nov 27 19:01:00 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:01:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3167 >/dev/null 2>/dev/null
selfserv with PID 3167 found at Tue Nov 27 19:01:00 EST 2012
selfserv with PID 3167 started at Tue Nov 27 19:01:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2594: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3167 at Tue Nov 27 19:01:01 EST 2012
kill -USR1 3167
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3167 killed at Tue Nov 27 19:01:01 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:01:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3244 >/dev/null 2>/dev/null
selfserv with PID 3244 found at Tue Nov 27 19:01:01 EST 2012
selfserv with PID 3244 started at Tue Nov 27 19:01:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2595: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3244 at Tue Nov 27 19:01:01 EST 2012
kill -USR1 3244
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3244 killed at Tue Nov 27 19:01:01 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:01:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3302 >/dev/null 2>/dev/null
selfserv with PID 3302 found at Tue Nov 27 19:01:01 EST 2012
selfserv with PID 3302 started at Tue Nov 27 19:01:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2596: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3302 at Tue Nov 27 19:01:01 EST 2012
kill -USR1 3302
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3302 killed at Tue Nov 27 19:01:01 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:01:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3359 >/dev/null 2>/dev/null
selfserv with PID 3359 found at Tue Nov 27 19:01:01 EST 2012
selfserv with PID 3359 started at Tue Nov 27 19:01:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2597: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3359 at Tue Nov 27 19:01:02 EST 2012
kill -USR1 3359
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3359 killed at Tue Nov 27 19:01:02 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:01:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3416 >/dev/null 2>/dev/null
selfserv with PID 3416 found at Tue Nov 27 19:01:02 EST 2012
selfserv with PID 3416 started at Tue Nov 27 19:01:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2598: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3416 at Tue Nov 27 19:01:02 EST 2012
kill -USR1 3416
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3416 killed at Tue Nov 27 19:01:02 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3488 >/dev/null 2>/dev/null
selfserv with PID 3488 found at Tue Nov 27 19:01:02 EST 2012
selfserv with PID 3488 started at Tue Nov 27 19:01:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2599: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3488 at Tue Nov 27 19:01:02 EST 2012
kill -USR1 3488
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3488 killed at Tue Nov 27 19:01:02 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3545 >/dev/null 2>/dev/null
selfserv with PID 3545 found at Tue Nov 27 19:01:02 EST 2012
selfserv with PID 3545 started at Tue Nov 27 19:01:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2600: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3545 at Tue Nov 27 19:01:03 EST 2012
kill -USR1 3545
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3545 killed at Tue Nov 27 19:01:03 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3602 >/dev/null 2>/dev/null
selfserv with PID 3602 found at Tue Nov 27 19:01:03 EST 2012
selfserv with PID 3602 started at Tue Nov 27 19:01:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2601: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3602 at Tue Nov 27 19:01:03 EST 2012
kill -USR1 3602
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3602 killed at Tue Nov 27 19:01:03 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3659 >/dev/null 2>/dev/null
selfserv with PID 3659 found at Tue Nov 27 19:01:03 EST 2012
selfserv with PID 3659 started at Tue Nov 27 19:01:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2602: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3659 at Tue Nov 27 19:01:03 EST 2012
kill -USR1 3659
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3659 killed at Tue Nov 27 19:01:03 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3716 >/dev/null 2>/dev/null
selfserv with PID 3716 found at Tue Nov 27 19:01:04 EST 2012
selfserv with PID 3716 started at Tue Nov 27 19:01:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2603: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3716 at Tue Nov 27 19:01:04 EST 2012
kill -USR1 3716
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3716 killed at Tue Nov 27 19:01:04 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3773 >/dev/null 2>/dev/null
selfserv with PID 3773 found at Tue Nov 27 19:01:04 EST 2012
selfserv with PID 3773 started at Tue Nov 27 19:01:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2604: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3773 at Tue Nov 27 19:01:04 EST 2012
kill -USR1 3773
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3773 killed at Tue Nov 27 19:01:04 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3830 >/dev/null 2>/dev/null
selfserv with PID 3830 found at Tue Nov 27 19:01:04 EST 2012
selfserv with PID 3830 started at Tue Nov 27 19:01:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2605: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3830 at Tue Nov 27 19:01:05 EST 2012
kill -USR1 3830
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3830 killed at Tue Nov 27 19:01:05 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3887 >/dev/null 2>/dev/null
selfserv with PID 3887 found at Tue Nov 27 19:01:05 EST 2012
selfserv with PID 3887 started at Tue Nov 27 19:01:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2606: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3887 at Tue Nov 27 19:01:05 EST 2012
kill -USR1 3887
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3887 killed at Tue Nov 27 19:01:05 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3944 >/dev/null 2>/dev/null
selfserv with PID 3944 found at Tue Nov 27 19:01:05 EST 2012
selfserv with PID 3944 started at Tue Nov 27 19:01:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2607: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3944 at Tue Nov 27 19:01:05 EST 2012
kill -USR1 3944
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3944 killed at Tue Nov 27 19:01:05 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4001 >/dev/null 2>/dev/null
selfserv with PID 4001 found at Tue Nov 27 19:01:05 EST 2012
selfserv with PID 4001 started at Tue Nov 27 19:01:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2608: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4001 at Tue Nov 27 19:01:05 EST 2012
kill -USR1 4001
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4001 killed at Tue Nov 27 19:01:06 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4058 >/dev/null 2>/dev/null
selfserv with PID 4058 found at Tue Nov 27 19:01:06 EST 2012
selfserv with PID 4058 started at Tue Nov 27 19:01:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2609: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4058 at Tue Nov 27 19:01:06 EST 2012
kill -USR1 4058
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4058 killed at Tue Nov 27 19:01:06 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4115 >/dev/null 2>/dev/null
selfserv with PID 4115 found at Tue Nov 27 19:01:06 EST 2012
selfserv with PID 4115 started at Tue Nov 27 19:01:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2610: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4115 at Tue Nov 27 19:01:06 EST 2012
kill -USR1 4115
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4115 killed at Tue Nov 27 19:01:06 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4172 >/dev/null 2>/dev/null
selfserv with PID 4172 found at Tue Nov 27 19:01:06 EST 2012
selfserv with PID 4172 started at Tue Nov 27 19:01:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2611: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4172 at Tue Nov 27 19:01:07 EST 2012
kill -USR1 4172
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4172 killed at Tue Nov 27 19:01:07 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4229 >/dev/null 2>/dev/null
selfserv with PID 4229 found at Tue Nov 27 19:01:07 EST 2012
selfserv with PID 4229 started at Tue Nov 27 19:01:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2612: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4229 at Tue Nov 27 19:01:07 EST 2012
kill -USR1 4229
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4229 killed at Tue Nov 27 19:01:07 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4286 >/dev/null 2>/dev/null
selfserv with PID 4286 found at Tue Nov 27 19:01:07 EST 2012
selfserv with PID 4286 started at Tue Nov 27 19:01:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2613: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4286 at Tue Nov 27 19:01:07 EST 2012
kill -USR1 4286
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4286 killed at Tue Nov 27 19:01:07 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4343 >/dev/null 2>/dev/null
selfserv with PID 4343 found at Tue Nov 27 19:01:07 EST 2012
selfserv with PID 4343 started at Tue Nov 27 19:01:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4343 at Tue Nov 27 19:01:08 EST 2012
kill -USR1 4343
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4343 killed at Tue Nov 27 19:01:08 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4401 >/dev/null 2>/dev/null
selfserv with PID 4401 found at Tue Nov 27 19:01:08 EST 2012
selfserv with PID 4401 started at Tue Nov 27 19:01:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2615: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4401 at Tue Nov 27 19:01:08 EST 2012
kill -USR1 4401
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4401 killed at Tue Nov 27 19:01:08 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4458 >/dev/null 2>/dev/null
selfserv with PID 4458 found at Tue Nov 27 19:01:08 EST 2012
selfserv with PID 4458 started at Tue Nov 27 19:01:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2616: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4458 at Tue Nov 27 19:01:08 EST 2012
kill -USR1 4458
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4458 killed at Tue Nov 27 19:01:08 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4515 >/dev/null 2>/dev/null
selfserv with PID 4515 found at Tue Nov 27 19:01:08 EST 2012
selfserv with PID 4515 started at Tue Nov 27 19:01:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2617: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4515 at Tue Nov 27 19:01:09 EST 2012
kill -USR1 4515
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4515 killed at Tue Nov 27 19:01:09 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4572 >/dev/null 2>/dev/null
selfserv with PID 4572 found at Tue Nov 27 19:01:09 EST 2012
selfserv with PID 4572 started at Tue Nov 27 19:01:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2618: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4572 at Tue Nov 27 19:01:09 EST 2012
kill -USR1 4572
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4572 killed at Tue Nov 27 19:01:09 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 19:01:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4650 >/dev/null 2>/dev/null
selfserv with PID 4650 found at Tue Nov 27 19:01:09 EST 2012
selfserv with PID 4650 started at Tue Nov 27 19:01:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2619: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4650 at Tue Nov 27 19:01:09 EST 2012
kill -USR1 4650
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4650 killed at Tue Nov 27 19:01:09 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 19:01:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4713 >/dev/null 2>/dev/null
selfserv with PID 4713 found at Tue Nov 27 19:01:09 EST 2012
selfserv with PID 4713 started at Tue Nov 27 19:01:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2620: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4713 at Tue Nov 27 19:01:10 EST 2012
kill -USR1 4713
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4713 killed at Tue Nov 27 19:01:10 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 19:01:10 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4776 >/dev/null 2>/dev/null
selfserv with PID 4776 found at Tue Nov 27 19:01:10 EST 2012
selfserv with PID 4776 started at Tue Nov 27 19:01:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2621: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4776 at Tue Nov 27 19:01:10 EST 2012
kill -USR1 4776
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4776 killed at Tue Nov 27 19:01:10 EST 2012
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Tue Nov 27 19:01:10 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4839 >/dev/null 2>/dev/null
selfserv with PID 4839 found at Tue Nov 27 19:01:10 EST 2012
selfserv with PID 4839 started at Tue Nov 27 19:01:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2622: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4839 at Tue Nov 27 19:01:10 EST 2012
kill -USR1 4839
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4839 killed at Tue Nov 27 19:01:10 EST 2012
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Tue Nov 27 19:01:10 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4902 >/dev/null 2>/dev/null
selfserv with PID 4902 found at Tue Nov 27 19:01:10 EST 2012
selfserv with PID 4902 started at Tue Nov 27 19:01:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #2623: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4902 at Tue Nov 27 19:01:11 EST 2012
kill -USR1 4902
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4902 killed at Tue Nov 27 19:01:11 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 19:01:11 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4966 >/dev/null 2>/dev/null
selfserv with PID 4966 found at Tue Nov 27 19:01:11 EST 2012
selfserv with PID 4966 started at Tue Nov 27 19:01:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2624: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 4966 at Tue Nov 27 19:01:11 EST 2012
kill -USR1 4966
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4966 killed at Tue Nov 27 19:01:11 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 19:01:11 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5029 >/dev/null 2>/dev/null
selfserv with PID 5029 found at Tue Nov 27 19:01:11 EST 2012
selfserv with PID 5029 started at Tue Nov 27 19:01:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2625: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 5029 at Tue Nov 27 19:01:11 EST 2012
kill -USR1 5029
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5029 killed at Tue Nov 27 19:01:11 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Tue Nov 27 19:01:11 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5092 >/dev/null 2>/dev/null
selfserv with PID 5092 found at Tue Nov 27 19:01:11 EST 2012
selfserv with PID 5092 started at Tue Nov 27 19:01:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s).
tstclnt: exiting with return code 1
ssl.sh: #2626: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5092 at Tue Nov 27 19:01:12 EST 2012
kill -USR1 5092
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5092 killed at Tue Nov 27 19:01:12 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Tue Nov 27 19:01:12 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5155 >/dev/null 2>/dev/null
selfserv with PID 5155 found at Tue Nov 27 19:01:12 EST 2012
selfserv with PID 5155 started at Tue Nov 27 19:01:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #2627: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5155 at Tue Nov 27 19:01:12 EST 2012
kill -USR1 5155
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5155 killed at Tue Nov 27 19:01:12 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 19:01:12 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5218 >/dev/null 2>/dev/null
selfserv with PID 5218 found at Tue Nov 27 19:01:12 EST 2012
selfserv with PID 5218 started at Tue Nov 27 19:01:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2628: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5218 at Tue Nov 27 19:01:12 EST 2012
kill -USR1 5218
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5218 killed at Tue Nov 27 19:01:12 EST 2012
ssl.sh: SSL Stress Test  - server fips/client normal  - with ECC ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (non-FIPS only)
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:01:13 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5355 >/dev/null 2>/dev/null
selfserv with PID 5355 found at Tue Nov 27 19:01:13 EST 2012
selfserv with PID 5355 started at Tue Nov 27 19:01:13 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 1000 -C c -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:13 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:13 EST 2012
ssl.sh: #2629: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5355 at Tue Nov 27 19:01:13 EST 2012
kill -USR1 5355
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5355 killed at Tue Nov 27 19:01:13 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:01:13 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5431 >/dev/null 2>/dev/null
selfserv with PID 5431 found at Tue Nov 27 19:01:13 EST 2012
selfserv with PID 5431 started at Tue Nov 27 19:01:13 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 1000 -C c \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:13 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:14 EST 2012
ssl.sh: #2630: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5431 at Tue Nov 27 19:01:14 EST 2012
kill -USR1 5431
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5431 killed at Tue Nov 27 19:01:14 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 19:01:14 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5507 >/dev/null 2>/dev/null
selfserv with PID 5507 found at Tue Nov 27 19:01:14 EST 2012
selfserv with PID 5507 started at Tue Nov 27 19:01:14 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 1000 -C c -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:14 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:14 EST 2012
ssl.sh: #2631: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5507 at Tue Nov 27 19:01:14 EST 2012
kill -USR1 5507
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5507 killed at Tue Nov 27 19:01:14 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 19:01:14 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5583 >/dev/null 2>/dev/null
selfserv with PID 5583 found at Tue Nov 27 19:01:14 EST 2012
selfserv with PID 5583 started at Tue Nov 27 19:01:14 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:14 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:01:15 EST 2012
ssl.sh: #2632: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5583 at Tue Nov 27 19:01:15 EST 2012
kill -USR1 5583
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5583 killed at Tue Nov 27 19:01:15 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 19:01:15 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5659 >/dev/null 2>/dev/null
selfserv with PID 5659 found at Tue Nov 27 19:01:15 EST 2012
selfserv with PID 5659 started at Tue Nov 27 19:01:15 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 1000 -C c -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:15 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:16 EST 2012
ssl.sh: #2633: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5659 at Tue Nov 27 19:01:16 EST 2012
kill -USR1 5659
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5659 killed at Tue Nov 27 19:01:16 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 19:01:16 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5735 >/dev/null 2>/dev/null
selfserv with PID 5735 found at Tue Nov 27 19:01:16 EST 2012
selfserv with PID 5735 started at Tue Nov 27 19:01:16 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 1000 -C c -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:16 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:01:16 EST 2012
ssl.sh: #2634: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5735 at Tue Nov 27 19:01:16 EST 2012
kill -USR1 5735
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5735 killed at Tue Nov 27 19:01:16 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 19:01:16 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5811 >/dev/null 2>/dev/null
selfserv with PID 5811 found at Tue Nov 27 19:01:16 EST 2012
selfserv with PID 5811 started at Tue Nov 27 19:01:16 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 1000 -C c -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:16 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:01:17 EST 2012
ssl.sh: #2635: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5811 at Tue Nov 27 19:01:17 EST 2012
kill -USR1 5811
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5811 killed at Tue Nov 27 19:01:17 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Tue Nov 27 19:01:17 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5893 >/dev/null 2>/dev/null
selfserv with PID 5893 found at Tue Nov 27 19:01:17 EST 2012
selfserv with PID 5893 started at Tue Nov 27 19:01:17 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:17 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:01:17 EST 2012
ssl.sh: #2636: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5893 at Tue Nov 27 19:01:17 EST 2012
kill -USR1 5893
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5893 killed at Tue Nov 27 19:01:17 EST 2012
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) (non-FIPS only)
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:01:18 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5994 >/dev/null 2>/dev/null
selfserv with PID 5994 found at Tue Nov 27 19:01:18 EST 2012
selfserv with PID 5994 started at Tue Nov 27 19:01:18 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:18 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:01:18 EST 2012
ssl.sh: #2637: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5994 at Tue Nov 27 19:01:18 EST 2012
kill -USR1 5994
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5994 killed at Tue Nov 27 19:01:18 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:01:18 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6069 >/dev/null 2>/dev/null
selfserv with PID 6069 found at Tue Nov 27 19:01:18 EST 2012
selfserv with PID 6069 started at Tue Nov 27 19:01:18 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 100 -C c -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:18 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:01:19 EST 2012
ssl.sh: #2638: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6069 at Tue Nov 27 19:01:19 EST 2012
kill -USR1 6069
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6069 killed at Tue Nov 27 19:01:19 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:01:19 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6145 >/dev/null 2>/dev/null
selfserv with PID 6145 found at Tue Nov 27 19:01:19 EST 2012
selfserv with PID 6145 started at Tue Nov 27 19:01:19 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:19 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:01:19 EST 2012
ssl.sh: #2639: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6145 at Tue Nov 27 19:01:19 EST 2012
kill -USR1 6145
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6145 killed at Tue Nov 27 19:01:19 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 19:01:20 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6221 >/dev/null 2>/dev/null
selfserv with PID 6221 found at Tue Nov 27 19:01:20 EST 2012
selfserv with PID 6221 started at Tue Nov 27 19:01:20 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:20 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:20 EST 2012
ssl.sh: #2640: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6221 at Tue Nov 27 19:01:20 EST 2012
kill -USR1 6221
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6221 killed at Tue Nov 27 19:01:20 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:01:20 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6297 >/dev/null 2>/dev/null
selfserv with PID 6297 found at Tue Nov 27 19:01:20 EST 2012
selfserv with PID 6297 started at Tue Nov 27 19:01:20 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:20 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:20 EST 2012
ssl.sh: #2641: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6297 at Tue Nov 27 19:01:20 EST 2012
kill -USR1 6297
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6297 killed at Tue Nov 27 19:01:20 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 19:01:20 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6373 >/dev/null 2>/dev/null
selfserv with PID 6373 found at Tue Nov 27 19:01:20 EST 2012
selfserv with PID 6373 started at Tue Nov 27 19:01:20 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:20 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:01:21 EST 2012
ssl.sh: #2642: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6373 at Tue Nov 27 19:01:21 EST 2012
kill -USR1 6373
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6373 killed at Tue Nov 27 19:01:21 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:01:21 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6449 >/dev/null 2>/dev/null
selfserv with PID 6449 found at Tue Nov 27 19:01:21 EST 2012
selfserv with PID 6449 started at Tue Nov 27 19:01:21 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:21 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:01:21 EST 2012
ssl.sh: #2643: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6449 at Tue Nov 27 19:01:21 EST 2012
kill -USR1 6449
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6449 killed at Tue Nov 27 19:01:21 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Tue Nov 27 19:01:21 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6531 >/dev/null 2>/dev/null
selfserv with PID 6531 found at Tue Nov 27 19:01:21 EST 2012
selfserv with PID 6531 started at Tue Nov 27 19:01:21 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:21 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:01:22 EST 2012
ssl.sh: #2644: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6531 at Tue Nov 27 19:01:22 EST 2012
kill -USR1 6531
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6531 killed at Tue Nov 27 19:01:22 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Tue Nov 27 19:01:22 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -k buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6613 >/dev/null 2>/dev/null
selfserv with PID 6613 found at Tue Nov 27 19:01:22 EST 2012
selfserv with PID 6613 started at Tue Nov 27 19:01:22 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u -a buildnss02-sni.usersys.redhat.com \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:22 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:01:22 EST 2012
ssl.sh: #2645: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6613 at Tue Nov 27 19:01:23 EST 2012
kill -USR1 6613
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6613 killed at Tue Nov 27 19:01:23 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:01:23 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6710 >/dev/null 2>/dev/null
selfserv with PID 6710 found at Tue Nov 27 19:01:23 EST 2012
selfserv with PID 6710 started at Tue Nov 27 19:01:23 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 100 -C :C009 -N -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:23 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:01:24 EST 2012
ssl.sh: #2646: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6710 at Tue Nov 27 19:01:24 EST 2012
kill -USR1 6710
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6710 killed at Tue Nov 27 19:01:24 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:01:24 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6785 >/dev/null 2>/dev/null
selfserv with PID 6785 found at Tue Nov 27 19:01:24 EST 2012
selfserv with PID 6785 started at Tue Nov 27 19:01:24 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 1000 -C :C013 -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:24 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:24 EST 2012
ssl.sh: #2647: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6785 at Tue Nov 27 19:01:24 EST 2012
kill -USR1 6785
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6785 killed at Tue Nov 27 19:01:24 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:01:24 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6861 >/dev/null 2>/dev/null
selfserv with PID 6861 found at Tue Nov 27 19:01:24 EST 2012
selfserv with PID 6861 started at Tue Nov 27 19:01:24 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 100 -C :C004 -N \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:24 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:01:25 EST 2012
ssl.sh: #2648: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6861 at Tue Nov 27 19:01:25 EST 2012
kill -USR1 6861
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6861 killed at Tue Nov 27 19:01:25 EST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:01:25 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6936 >/dev/null 2>/dev/null
selfserv with PID 6936 found at Tue Nov 27 19:01:25 EST 2012
selfserv with PID 6936 started at Tue Nov 27 19:01:25 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 100 -C :C00E -N \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:25 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:01:26 EST 2012
ssl.sh: #2649: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 6936 at Tue Nov 27 19:01:26 EST 2012
kill -USR1 6936
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6936 killed at Tue Nov 27 19:01:26 EST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:01:26 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 7011 >/dev/null 2>/dev/null
selfserv with PID 7011 found at Tue Nov 27 19:01:26 EST 2012
selfserv with PID 7011 started at Tue Nov 27 19:01:26 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 1000 -C :C013 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:26 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:27 EST 2012
ssl.sh: #2650: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7011 at Tue Nov 27 19:01:27 EST 2012
kill -USR1 7011
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 7011 killed at Tue Nov 27 19:01:27 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 19:01:27 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 7087 >/dev/null 2>/dev/null
selfserv with PID 7087 found at Tue Nov 27 19:01:27 EST 2012
selfserv with PID 7087 started at Tue Nov 27 19:01:27 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 1000 -C :C004 -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:27 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:01:28 EST 2012
ssl.sh: #2651: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7087 at Tue Nov 27 19:01:28 EST 2012
kill -USR1 7087
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 7087 killed at Tue Nov 27 19:01:28 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:01:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 7184 >/dev/null 2>/dev/null
selfserv with PID 7184 found at Tue Nov 27 19:01:28 EST 2012
selfserv with PID 7184 started at Tue Nov 27 19:01:28 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:28 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:01:28 EST 2012
ssl.sh: #2652: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7184 at Tue Nov 27 19:01:28 EST 2012
kill -USR1 7184
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 7184 killed at Tue Nov 27 19:01:28 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 19:01:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 7259 >/dev/null 2>/dev/null
selfserv with PID 7259 found at Tue Nov 27 19:01:28 EST 2012
selfserv with PID 7259 started at Tue Nov 27 19:01:28 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:28 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:29 EST 2012
ssl.sh: #2653: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7259 at Tue Nov 27 19:01:29 EST 2012
kill -USR1 7259
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 7259 killed at Tue Nov 27 19:01:29 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:01:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 7335 >/dev/null 2>/dev/null
selfserv with PID 7335 found at Tue Nov 27 19:01:29 EST 2012
selfserv with PID 7335 started at Tue Nov 27 19:01:29 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 10 -C :C004 -N -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:29 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:01:29 EST 2012
ssl.sh: #2654: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7335 at Tue Nov 27 19:01:29 EST 2012
kill -USR1 7335
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 7335 killed at Tue Nov 27 19:01:29 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:01:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 7410 >/dev/null 2>/dev/null
selfserv with PID 7410 found at Tue Nov 27 19:01:29 EST 2012
selfserv with PID 7410 started at Tue Nov 27 19:01:29 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:29 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:01:30 EST 2012
ssl.sh: #2655: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7410 at Tue Nov 27 19:01:30 EST 2012
kill -USR1 7410
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 7410 killed at Tue Nov 27 19:01:30 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 19:01:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 7485 >/dev/null 2>/dev/null
selfserv with PID 7485 found at Tue Nov 27 19:01:30 EST 2012
selfserv with PID 7485 started at Tue Nov 27 19:01:30 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 100 -C :C013 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:30 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:30 EST 2012
ssl.sh: #2656: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7485 at Tue Nov 27 19:01:30 EST 2012
kill -USR1 7485
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 7485 killed at Tue Nov 27 19:01:30 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:01:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 7561 >/dev/null 2>/dev/null
selfserv with PID 7561 found at Tue Nov 27 19:01:30 EST 2012
selfserv with PID 7561 started at Tue Nov 27 19:01:30 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:30 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:01:30 EST 2012
ssl.sh: #2657: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 7561 at Tue Nov 27 19:01:30 EST 2012
kill -USR1 7561
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 7561 killed at Tue Nov 27 19:01:30 EST 2012
ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal  - with ECC ===============================
selfserv starting at Tue Nov 27 19:01:30 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
selfserv with PID 7624 started at Tue Nov 27 19:01:31 EST 2012
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2658: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2659: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2660: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2661: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2662: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2663: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2664: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2665: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2666: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2667: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2668: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2669: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2670: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2671: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2672: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2673: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2674: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2675: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2676: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2677: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2678: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2679: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2680: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  f    TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  g    TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2681: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2682: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2683: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2684: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2685: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2686: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2687: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2688: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2689: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2690: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2691: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2692: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2693: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2694: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2695: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2696: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7624 >/dev/null 2>/dev/null
selfserv with PID 7624 found at Tue Nov 27 19:01:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2697: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 7624 at Tue Nov 27 19:01:34 EST 2012
kill -USR1 7624
selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 7624 killed at Tue Nov 27 19:01:34 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:01:34 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8847 >/dev/null 2>/dev/null
selfserv with PID 8847 found at Tue Nov 27 19:01:34 EST 2012
selfserv with PID 8847 started at Tue Nov 27 19:01:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2698: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8847 >/dev/null 2>/dev/null
selfserv with PID 8847 found at Tue Nov 27 19:01:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2699: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8847 >/dev/null 2>/dev/null
selfserv with PID 8847 found at Tue Nov 27 19:01:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2700: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8847 >/dev/null 2>/dev/null
selfserv with PID 8847 found at Tue Nov 27 19:01:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2701: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8847 >/dev/null 2>/dev/null
selfserv with PID 8847 found at Tue Nov 27 19:01:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2702: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 8847 at Tue Nov 27 19:01:34 EST 2012
kill -USR1 8847
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8847 killed at Tue Nov 27 19:01:35 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:01:35 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:35 EST 2012
selfserv with PID 8995 started at Tue Nov 27 19:01:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2703: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2704: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2705: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2706: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2707: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2708: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2709: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2710: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2711: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2712: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2713: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2714: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2715: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2716: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8995 >/dev/null 2>/dev/null
selfserv with PID 8995 found at Tue Nov 27 19:01:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2717: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 8995 at Tue Nov 27 19:01:36 EST 2012
kill -USR1 8995
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8995 killed at Tue Nov 27 19:01:36 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:01:36 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9394 >/dev/null 2>/dev/null
selfserv with PID 9394 found at Tue Nov 27 19:01:36 EST 2012
selfserv with PID 9394 started at Tue Nov 27 19:01:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2718: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 9394 >/dev/null 2>/dev/null
selfserv with PID 9394 found at Tue Nov 27 19:01:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2719: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9394 >/dev/null 2>/dev/null
selfserv with PID 9394 found at Tue Nov 27 19:01:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2720: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 9394 >/dev/null 2>/dev/null
selfserv with PID 9394 found at Tue Nov 27 19:01:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2721: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 9394 >/dev/null 2>/dev/null
selfserv with PID 9394 found at Tue Nov 27 19:01:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2722: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 9394 at Tue Nov 27 19:01:37 EST 2012
kill -USR1 9394
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9394 killed at Tue Nov 27 19:01:37 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:01:37 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:37 EST 2012
selfserv with PID 9542 started at Tue Nov 27 19:01:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2723: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2724: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2725: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2726: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2727: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2728: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2729: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2730: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2731: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2732: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2733: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2734: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2735: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2736: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 9542 >/dev/null 2>/dev/null
selfserv with PID 9542 found at Tue Nov 27 19:01:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2737: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 9542 at Tue Nov 27 19:01:39 EST 2012
kill -USR1 9542
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9542 killed at Tue Nov 27 19:01:39 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:01:39 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9927 >/dev/null 2>/dev/null
selfserv with PID 9927 found at Tue Nov 27 19:01:39 EST 2012
selfserv with PID 9927 started at Tue Nov 27 19:01:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2738: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 9927 >/dev/null 2>/dev/null
selfserv with PID 9927 found at Tue Nov 27 19:01:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2739: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 9927 >/dev/null 2>/dev/null
selfserv with PID 9927 found at Tue Nov 27 19:01:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2740: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 9927 >/dev/null 2>/dev/null
selfserv with PID 9927 found at Tue Nov 27 19:01:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2741: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 9927 >/dev/null 2>/dev/null
selfserv with PID 9927 found at Tue Nov 27 19:01:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2742: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 9927 at Tue Nov 27 19:01:39 EST 2012
kill -USR1 9927
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9927 killed at Tue Nov 27 19:01:39 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:01:39 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10075 >/dev/null 2>/dev/null
selfserv with PID 10075 found at Tue Nov 27 19:01:39 EST 2012
selfserv with PID 10075 started at Tue Nov 27 19:01:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2743: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 10075 >/dev/null 2>/dev/null
selfserv with PID 10075 found at Tue Nov 27 19:01:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2744: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10075 >/dev/null 2>/dev/null
selfserv with PID 10075 found at Tue Nov 27 19:01:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2745: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 10075 >/dev/null 2>/dev/null
selfserv with PID 10075 found at Tue Nov 27 19:01:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2746: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 10075 >/dev/null 2>/dev/null
selfserv with PID 10075 found at Tue Nov 27 19:01:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2747: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10075 at Tue Nov 27 19:01:40 EST 2012
kill -USR1 10075
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10075 killed at Tue Nov 27 19:01:40 EST 2012
ssl.sh: SSL Client Authentication Extended Test - server fips/client normal  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:01:40 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10274 >/dev/null 2>/dev/null
selfserv with PID 10274 found at Tue Nov 27 19:01:40 EST 2012
selfserv with PID 10274 started at Tue Nov 27 19:01:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2748: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10274 at Tue Nov 27 19:01:40 EST 2012
kill -USR1 10274
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10274 killed at Tue Nov 27 19:01:40 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:01:40 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10331 >/dev/null 2>/dev/null
selfserv with PID 10331 found at Tue Nov 27 19:01:40 EST 2012
selfserv with PID 10331 started at Tue Nov 27 19:01:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2749: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10331 at Tue Nov 27 19:01:41 EST 2012
kill -USR1 10331
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10331 killed at Tue Nov 27 19:01:41 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:01:41 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10388 >/dev/null 2>/dev/null
selfserv with PID 10388 found at Tue Nov 27 19:01:41 EST 2012
selfserv with PID 10388 started at Tue Nov 27 19:01:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2750: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10388 at Tue Nov 27 19:01:41 EST 2012
kill -USR1 10388
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10388 killed at Tue Nov 27 19:01:41 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:01:41 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10445 >/dev/null 2>/dev/null
selfserv with PID 10445 found at Tue Nov 27 19:01:41 EST 2012
selfserv with PID 10445 started at Tue Nov 27 19:01:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2751: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10445 at Tue Nov 27 19:01:41 EST 2012
kill -USR1 10445
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10445 killed at Tue Nov 27 19:01:41 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:01:41 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10502 >/dev/null 2>/dev/null
selfserv with PID 10502 found at Tue Nov 27 19:01:41 EST 2012
selfserv with PID 10502 started at Tue Nov 27 19:01:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2752: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10502 at Tue Nov 27 19:01:42 EST 2012
kill -USR1 10502
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10502 killed at Tue Nov 27 19:01:42 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:01:42 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10560 >/dev/null 2>/dev/null
selfserv with PID 10560 found at Tue Nov 27 19:01:42 EST 2012
selfserv with PID 10560 started at Tue Nov 27 19:01:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2753: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10560 at Tue Nov 27 19:01:42 EST 2012
kill -USR1 10560
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10560 killed at Tue Nov 27 19:01:42 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:01:42 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10617 >/dev/null 2>/dev/null
selfserv with PID 10617 found at Tue Nov 27 19:01:42 EST 2012
selfserv with PID 10617 started at Tue Nov 27 19:01:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2754: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10617 at Tue Nov 27 19:01:42 EST 2012
kill -USR1 10617
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10617 killed at Tue Nov 27 19:01:42 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:01:42 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10674 >/dev/null 2>/dev/null
selfserv with PID 10674 found at Tue Nov 27 19:01:42 EST 2012
selfserv with PID 10674 started at Tue Nov 27 19:01:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2755: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10674 at Tue Nov 27 19:01:43 EST 2012
kill -USR1 10674
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10674 killed at Tue Nov 27 19:01:43 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:01:43 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10731 >/dev/null 2>/dev/null
selfserv with PID 10731 found at Tue Nov 27 19:01:43 EST 2012
selfserv with PID 10731 started at Tue Nov 27 19:01:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2756: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10731 at Tue Nov 27 19:01:43 EST 2012
kill -USR1 10731
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10731 killed at Tue Nov 27 19:01:43 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:01:43 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10788 >/dev/null 2>/dev/null
selfserv with PID 10788 found at Tue Nov 27 19:01:43 EST 2012
selfserv with PID 10788 started at Tue Nov 27 19:01:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2757: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10788 at Tue Nov 27 19:01:43 EST 2012
kill -USR1 10788
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10788 killed at Tue Nov 27 19:01:43 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:01:43 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10845 >/dev/null 2>/dev/null
selfserv with PID 10845 found at Tue Nov 27 19:01:43 EST 2012
selfserv with PID 10845 started at Tue Nov 27 19:01:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2758: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10845 at Tue Nov 27 19:01:44 EST 2012
kill -USR1 10845
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10845 killed at Tue Nov 27 19:01:44 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:01:44 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10902 >/dev/null 2>/dev/null
selfserv with PID 10902 found at Tue Nov 27 19:01:44 EST 2012
selfserv with PID 10902 started at Tue Nov 27 19:01:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2759: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10902 at Tue Nov 27 19:01:44 EST 2012
kill -USR1 10902
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10902 killed at Tue Nov 27 19:01:44 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:01:44 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10960 >/dev/null 2>/dev/null
selfserv with PID 10960 found at Tue Nov 27 19:01:44 EST 2012
selfserv with PID 10960 started at Tue Nov 27 19:01:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2760: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10960 at Tue Nov 27 19:01:44 EST 2012
kill -USR1 10960
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10960 killed at Tue Nov 27 19:01:44 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:01:44 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11017 >/dev/null 2>/dev/null
selfserv with PID 11017 found at Tue Nov 27 19:01:44 EST 2012
selfserv with PID 11017 started at Tue Nov 27 19:01:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2761: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11017 at Tue Nov 27 19:01:45 EST 2012
kill -USR1 11017
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11017 killed at Tue Nov 27 19:01:45 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:01:45 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11074 >/dev/null 2>/dev/null
selfserv with PID 11074 found at Tue Nov 27 19:01:45 EST 2012
selfserv with PID 11074 started at Tue Nov 27 19:01:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2762: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11074 at Tue Nov 27 19:01:45 EST 2012
kill -USR1 11074
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11074 killed at Tue Nov 27 19:01:45 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:01:45 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11131 >/dev/null 2>/dev/null
selfserv with PID 11131 found at Tue Nov 27 19:01:45 EST 2012
selfserv with PID 11131 started at Tue Nov 27 19:01:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2763: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11131 at Tue Nov 27 19:01:45 EST 2012
kill -USR1 11131
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11131 killed at Tue Nov 27 19:01:45 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:01:45 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11188 >/dev/null 2>/dev/null
selfserv with PID 11188 found at Tue Nov 27 19:01:45 EST 2012
selfserv with PID 11188 started at Tue Nov 27 19:01:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2764: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11188 at Tue Nov 27 19:01:46 EST 2012
kill -USR1 11188
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11188 killed at Tue Nov 27 19:01:46 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:01:46 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11245 >/dev/null 2>/dev/null
selfserv with PID 11245 found at Tue Nov 27 19:01:46 EST 2012
selfserv with PID 11245 started at Tue Nov 27 19:01:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2765: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11245 at Tue Nov 27 19:01:46 EST 2012
kill -USR1 11245
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11245 killed at Tue Nov 27 19:01:46 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:01:46 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11302 >/dev/null 2>/dev/null
selfserv with PID 11302 found at Tue Nov 27 19:01:46 EST 2012
selfserv with PID 11302 started at Tue Nov 27 19:01:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2766: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11302 at Tue Nov 27 19:01:46 EST 2012
kill -USR1 11302
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11302 killed at Tue Nov 27 19:01:46 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:01:46 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11359 >/dev/null 2>/dev/null
selfserv with PID 11359 found at Tue Nov 27 19:01:46 EST 2012
selfserv with PID 11359 started at Tue Nov 27 19:01:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2767: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11359 at Tue Nov 27 19:01:46 EST 2012
kill -USR1 11359
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11359 killed at Tue Nov 27 19:01:46 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:01:47 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11416 >/dev/null 2>/dev/null
selfserv with PID 11416 found at Tue Nov 27 19:01:47 EST 2012
selfserv with PID 11416 started at Tue Nov 27 19:01:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2768: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11416 at Tue Nov 27 19:01:47 EST 2012
kill -USR1 11416
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11416 killed at Tue Nov 27 19:01:47 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:01:47 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11473 >/dev/null 2>/dev/null
selfserv with PID 11473 found at Tue Nov 27 19:01:47 EST 2012
selfserv with PID 11473 started at Tue Nov 27 19:01:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2769: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11473 at Tue Nov 27 19:01:47 EST 2012
kill -USR1 11473
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11473 killed at Tue Nov 27 19:01:47 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:01:47 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11530 >/dev/null 2>/dev/null
selfserv with PID 11530 found at Tue Nov 27 19:01:47 EST 2012
selfserv with PID 11530 started at Tue Nov 27 19:01:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2770: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11530 at Tue Nov 27 19:01:47 EST 2012
kill -USR1 11530
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11530 killed at Tue Nov 27 19:01:48 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:01:48 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11587 >/dev/null 2>/dev/null
selfserv with PID 11587 found at Tue Nov 27 19:01:48 EST 2012
selfserv with PID 11587 started at Tue Nov 27 19:01:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2771: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11587 at Tue Nov 27 19:01:48 EST 2012
kill -USR1 11587
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11587 killed at Tue Nov 27 19:01:48 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:01:48 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11646 >/dev/null 2>/dev/null
selfserv with PID 11646 found at Tue Nov 27 19:01:48 EST 2012
selfserv with PID 11646 started at Tue Nov 27 19:01:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2772: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11646 at Tue Nov 27 19:01:48 EST 2012
kill -USR1 11646
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11646 killed at Tue Nov 27 19:01:48 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:01:48 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11703 >/dev/null 2>/dev/null
selfserv with PID 11703 found at Tue Nov 27 19:01:48 EST 2012
selfserv with PID 11703 started at Tue Nov 27 19:01:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2773: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11703 at Tue Nov 27 19:01:48 EST 2012
kill -USR1 11703
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11703 killed at Tue Nov 27 19:01:48 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:01:49 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11762 >/dev/null 2>/dev/null
selfserv with PID 11762 found at Tue Nov 27 19:01:49 EST 2012
selfserv with PID 11762 started at Tue Nov 27 19:01:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2774: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11762 at Tue Nov 27 19:01:49 EST 2012
kill -USR1 11762
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11762 killed at Tue Nov 27 19:01:49 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:01:49 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11819 >/dev/null 2>/dev/null
selfserv with PID 11819 found at Tue Nov 27 19:01:49 EST 2012
selfserv with PID 11819 started at Tue Nov 27 19:01:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2775: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11819 at Tue Nov 27 19:01:49 EST 2012
kill -USR1 11819
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11819 killed at Tue Nov 27 19:01:49 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:01:49 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11877 >/dev/null 2>/dev/null
selfserv with PID 11877 found at Tue Nov 27 19:01:49 EST 2012
selfserv with PID 11877 started at Tue Nov 27 19:01:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2776: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11877 at Tue Nov 27 19:01:49 EST 2012
kill -USR1 11877
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11877 killed at Tue Nov 27 19:01:49 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:01:49 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11934 >/dev/null 2>/dev/null
selfserv with PID 11934 found at Tue Nov 27 19:01:49 EST 2012
selfserv with PID 11934 started at Tue Nov 27 19:01:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2777: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11934 at Tue Nov 27 19:01:50 EST 2012
kill -USR1 11934
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11934 killed at Tue Nov 27 19:01:50 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:50 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12006 >/dev/null 2>/dev/null
selfserv with PID 12006 found at Tue Nov 27 19:01:50 EST 2012
selfserv with PID 12006 started at Tue Nov 27 19:01:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2778: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12006 at Tue Nov 27 19:01:50 EST 2012
kill -USR1 12006
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12006 killed at Tue Nov 27 19:01:50 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:50 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12063 >/dev/null 2>/dev/null
selfserv with PID 12063 found at Tue Nov 27 19:01:50 EST 2012
selfserv with PID 12063 started at Tue Nov 27 19:01:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2779: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12063 at Tue Nov 27 19:01:50 EST 2012
kill -USR1 12063
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12063 killed at Tue Nov 27 19:01:50 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:50 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12120 >/dev/null 2>/dev/null
selfserv with PID 12120 found at Tue Nov 27 19:01:51 EST 2012
selfserv with PID 12120 started at Tue Nov 27 19:01:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2780: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12120 at Tue Nov 27 19:01:51 EST 2012
kill -USR1 12120
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12120 killed at Tue Nov 27 19:01:51 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:51 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12177 >/dev/null 2>/dev/null
selfserv with PID 12177 found at Tue Nov 27 19:01:51 EST 2012
selfserv with PID 12177 started at Tue Nov 27 19:01:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2781: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12177 at Tue Nov 27 19:01:51 EST 2012
kill -USR1 12177
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12177 killed at Tue Nov 27 19:01:51 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:51 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12234 >/dev/null 2>/dev/null
selfserv with PID 12234 found at Tue Nov 27 19:01:51 EST 2012
selfserv with PID 12234 started at Tue Nov 27 19:01:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2782: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12234 at Tue Nov 27 19:01:51 EST 2012
kill -USR1 12234
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12234 killed at Tue Nov 27 19:01:51 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:51 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12291 >/dev/null 2>/dev/null
selfserv with PID 12291 found at Tue Nov 27 19:01:51 EST 2012
selfserv with PID 12291 started at Tue Nov 27 19:01:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2783: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12291 at Tue Nov 27 19:01:52 EST 2012
kill -USR1 12291
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12291 killed at Tue Nov 27 19:01:52 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:52 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12349 >/dev/null 2>/dev/null
selfserv with PID 12349 found at Tue Nov 27 19:01:52 EST 2012
selfserv with PID 12349 started at Tue Nov 27 19:01:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2784: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12349 at Tue Nov 27 19:01:52 EST 2012
kill -USR1 12349
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12349 killed at Tue Nov 27 19:01:52 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:52 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12408 >/dev/null 2>/dev/null
selfserv with PID 12408 found at Tue Nov 27 19:01:52 EST 2012
selfserv with PID 12408 started at Tue Nov 27 19:01:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2785: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12408 at Tue Nov 27 19:01:53 EST 2012
kill -USR1 12408
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12408 killed at Tue Nov 27 19:01:53 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:53 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12466 >/dev/null 2>/dev/null
selfserv with PID 12466 found at Tue Nov 27 19:01:53 EST 2012
selfserv with PID 12466 started at Tue Nov 27 19:01:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2786: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12466 at Tue Nov 27 19:01:53 EST 2012
kill -USR1 12466
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12466 killed at Tue Nov 27 19:01:53 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:53 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12523 >/dev/null 2>/dev/null
selfserv with PID 12523 found at Tue Nov 27 19:01:53 EST 2012
selfserv with PID 12523 started at Tue Nov 27 19:01:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2787: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12523 at Tue Nov 27 19:01:53 EST 2012
kill -USR1 12523
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12523 killed at Tue Nov 27 19:01:53 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:53 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12580 >/dev/null 2>/dev/null
selfserv with PID 12580 found at Tue Nov 27 19:01:53 EST 2012
selfserv with PID 12580 started at Tue Nov 27 19:01:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2788: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12580 at Tue Nov 27 19:01:54 EST 2012
kill -USR1 12580
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12580 killed at Tue Nov 27 19:01:54 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:54 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12637 >/dev/null 2>/dev/null
selfserv with PID 12637 found at Tue Nov 27 19:01:54 EST 2012
selfserv with PID 12637 started at Tue Nov 27 19:01:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2789: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12637 at Tue Nov 27 19:01:54 EST 2012
kill -USR1 12637
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12637 killed at Tue Nov 27 19:01:54 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:54 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12694 >/dev/null 2>/dev/null
selfserv with PID 12694 found at Tue Nov 27 19:01:54 EST 2012
selfserv with PID 12694 started at Tue Nov 27 19:01:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2790: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12694 at Tue Nov 27 19:01:54 EST 2012
kill -USR1 12694
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12694 killed at Tue Nov 27 19:01:54 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:54 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12751 >/dev/null 2>/dev/null
selfserv with PID 12751 found at Tue Nov 27 19:01:54 EST 2012
selfserv with PID 12751 started at Tue Nov 27 19:01:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2791: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12751 at Tue Nov 27 19:01:55 EST 2012
kill -USR1 12751
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12751 killed at Tue Nov 27 19:01:55 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:55 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12808 >/dev/null 2>/dev/null
selfserv with PID 12808 found at Tue Nov 27 19:01:55 EST 2012
selfserv with PID 12808 started at Tue Nov 27 19:01:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2792: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12808 at Tue Nov 27 19:01:55 EST 2012
kill -USR1 12808
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12808 killed at Tue Nov 27 19:01:55 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:55 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12865 >/dev/null 2>/dev/null
selfserv with PID 12865 found at Tue Nov 27 19:01:55 EST 2012
selfserv with PID 12865 started at Tue Nov 27 19:01:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2793: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12865 at Tue Nov 27 19:01:55 EST 2012
kill -USR1 12865
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12865 killed at Tue Nov 27 19:01:55 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:55 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12922 >/dev/null 2>/dev/null
selfserv with PID 12922 found at Tue Nov 27 19:01:55 EST 2012
selfserv with PID 12922 started at Tue Nov 27 19:01:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2794: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12922 at Tue Nov 27 19:01:56 EST 2012
kill -USR1 12922
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12922 killed at Tue Nov 27 19:01:56 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:56 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12979 >/dev/null 2>/dev/null
selfserv with PID 12979 found at Tue Nov 27 19:01:56 EST 2012
selfserv with PID 12979 started at Tue Nov 27 19:01:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2795: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12979 at Tue Nov 27 19:01:56 EST 2012
kill -USR1 12979
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12979 killed at Tue Nov 27 19:01:56 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:01:56 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13036 >/dev/null 2>/dev/null
selfserv with PID 13036 found at Tue Nov 27 19:01:56 EST 2012
selfserv with PID 13036 started at Tue Nov 27 19:01:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2796: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13036 at Tue Nov 27 19:01:56 EST 2012
kill -USR1 13036
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13036 killed at Tue Nov 27 19:01:56 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:01:56 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13093 >/dev/null 2>/dev/null
selfserv with PID 13093 found at Tue Nov 27 19:01:56 EST 2012
selfserv with PID 13093 started at Tue Nov 27 19:01:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2797: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13093 at Tue Nov 27 19:01:57 EST 2012
kill -USR1 13093
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13093 killed at Tue Nov 27 19:01:57 EST 2012
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: SSL Stress Test Extended Test - server fips/client normal  - with ECC ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:01:57 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13264 >/dev/null 2>/dev/null
selfserv with PID 13264 found at Tue Nov 27 19:01:57 EST 2012
selfserv with PID 13264 started at Tue Nov 27 19:01:57 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 1000 -C c -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:57 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:58 EST 2012
ssl.sh: #2798: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13264 at Tue Nov 27 19:01:58 EST 2012
kill -USR1 13264
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13264 killed at Tue Nov 27 19:01:58 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:01:58 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13340 >/dev/null 2>/dev/null
selfserv with PID 13340 found at Tue Nov 27 19:01:58 EST 2012
selfserv with PID 13340 started at Tue Nov 27 19:01:58 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 1000 -C c \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:58 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:58 EST 2012
ssl.sh: #2799: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13340 at Tue Nov 27 19:01:58 EST 2012
kill -USR1 13340
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13340 killed at Tue Nov 27 19:01:58 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 19:01:58 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13416 >/dev/null 2>/dev/null
selfserv with PID 13416 found at Tue Nov 27 19:01:58 EST 2012
selfserv with PID 13416 started at Tue Nov 27 19:01:58 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 1000 -C c -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:58 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:01:59 EST 2012
ssl.sh: #2800: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13416 at Tue Nov 27 19:01:59 EST 2012
kill -USR1 13416
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13416 killed at Tue Nov 27 19:01:59 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 19:01:59 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13492 >/dev/null 2>/dev/null
selfserv with PID 13492 found at Tue Nov 27 19:01:59 EST 2012
selfserv with PID 13492 started at Tue Nov 27 19:01:59 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:59 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:01:59 EST 2012
ssl.sh: #2801: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13492 at Tue Nov 27 19:01:59 EST 2012
kill -USR1 13492
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13492 killed at Tue Nov 27 19:01:59 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 19:01:59 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:01:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13569 >/dev/null 2>/dev/null
selfserv with PID 13569 found at Tue Nov 27 19:01:59 EST 2012
selfserv with PID 13569 started at Tue Nov 27 19:01:59 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:01:59 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:02:00 EST 2012
ssl.sh: #2802: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13569 at Tue Nov 27 19:02:00 EST 2012
kill -USR1 13569
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13569 killed at Tue Nov 27 19:02:00 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 19:02:00 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13645 >/dev/null 2>/dev/null
selfserv with PID 13645 found at Tue Nov 27 19:02:00 EST 2012
selfserv with PID 13645 started at Tue Nov 27 19:02:00 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:00 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:02:01 EST 2012
ssl.sh: #2803: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13645 at Tue Nov 27 19:02:01 EST 2012
kill -USR1 13645
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13645 killed at Tue Nov 27 19:02:01 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 19:02:01 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13729 >/dev/null 2>/dev/null
selfserv with PID 13729 found at Tue Nov 27 19:02:01 EST 2012
selfserv with PID 13729 started at Tue Nov 27 19:02:01 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 1000 -C c -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:01 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:02:01 EST 2012
ssl.sh: #2804: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13729 at Tue Nov 27 19:02:01 EST 2012
kill -USR1 13729
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13729 killed at Tue Nov 27 19:02:01 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:02:02 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13836 >/dev/null 2>/dev/null
selfserv with PID 13836 found at Tue Nov 27 19:02:02 EST 2012
selfserv with PID 13836 started at Tue Nov 27 19:02:02 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:02 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:02:02 EST 2012
ssl.sh: #2805: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13836 at Tue Nov 27 19:02:02 EST 2012
kill -USR1 13836
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13836 killed at Tue Nov 27 19:02:02 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:02:02 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13911 >/dev/null 2>/dev/null
selfserv with PID 13911 found at Tue Nov 27 19:02:02 EST 2012
selfserv with PID 13911 started at Tue Nov 27 19:02:02 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 100 -C c -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:02 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:02:03 EST 2012
ssl.sh: #2806: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13911 at Tue Nov 27 19:02:03 EST 2012
kill -USR1 13911
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13911 killed at Tue Nov 27 19:02:03 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:02:03 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13986 >/dev/null 2>/dev/null
selfserv with PID 13986 found at Tue Nov 27 19:02:03 EST 2012
selfserv with PID 13986 started at Tue Nov 27 19:02:03 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:03 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:02:04 EST 2012
ssl.sh: #2807: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13986 at Tue Nov 27 19:02:04 EST 2012
kill -USR1 13986
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13986 killed at Tue Nov 27 19:02:04 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 19:02:04 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14062 >/dev/null 2>/dev/null
selfserv with PID 14062 found at Tue Nov 27 19:02:04 EST 2012
selfserv with PID 14062 started at Tue Nov 27 19:02:04 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:04 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:02:04 EST 2012
ssl.sh: #2808: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 14062 at Tue Nov 27 19:02:04 EST 2012
kill -USR1 14062
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14062 killed at Tue Nov 27 19:02:04 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:02:04 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14138 >/dev/null 2>/dev/null
selfserv with PID 14138 found at Tue Nov 27 19:02:04 EST 2012
selfserv with PID 14138 started at Tue Nov 27 19:02:04 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:04 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:02:05 EST 2012
ssl.sh: #2809: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 14138 at Tue Nov 27 19:02:05 EST 2012
kill -USR1 14138
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14138 killed at Tue Nov 27 19:02:05 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 19:02:05 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14214 >/dev/null 2>/dev/null
selfserv with PID 14214 found at Tue Nov 27 19:02:05 EST 2012
selfserv with PID 14214 started at Tue Nov 27 19:02:05 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:05 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:02:05 EST 2012
ssl.sh: #2810: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 14214 at Tue Nov 27 19:02:05 EST 2012
kill -USR1 14214
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14214 killed at Tue Nov 27 19:02:05 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:02:05 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14291 >/dev/null 2>/dev/null
selfserv with PID 14291 found at Tue Nov 27 19:02:05 EST 2012
selfserv with PID 14291 started at Tue Nov 27 19:02:05 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:05 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:02:05 EST 2012
ssl.sh: #2811: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 14291 at Tue Nov 27 19:02:05 EST 2012
kill -USR1 14291
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14291 killed at Tue Nov 27 19:02:05 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:02:05 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14396 >/dev/null 2>/dev/null
selfserv with PID 14396 found at Tue Nov 27 19:02:05 EST 2012
selfserv with PID 14396 started at Tue Nov 27 19:02:05 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 100 -C :C009 -N -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:05 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:02:07 EST 2012
ssl.sh: #2812: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 14396 at Tue Nov 27 19:02:07 EST 2012
kill -USR1 14396
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14396 killed at Tue Nov 27 19:02:07 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:02:07 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14471 >/dev/null 2>/dev/null
selfserv with PID 14471 found at Tue Nov 27 19:02:07 EST 2012
selfserv with PID 14471 started at Tue Nov 27 19:02:07 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 1000 -C :C013 -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:07 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:02:07 EST 2012
ssl.sh: #2813: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 14471 at Tue Nov 27 19:02:07 EST 2012
kill -USR1 14471
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14471 killed at Tue Nov 27 19:02:07 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:02:07 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14547 >/dev/null 2>/dev/null
selfserv with PID 14547 found at Tue Nov 27 19:02:07 EST 2012
selfserv with PID 14547 started at Tue Nov 27 19:02:07 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 100 -C :C004 -N \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:07 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:02:08 EST 2012
ssl.sh: #2814: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 14547 at Tue Nov 27 19:02:08 EST 2012
kill -USR1 14547
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14547 killed at Tue Nov 27 19:02:09 EST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:02:09 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14622 >/dev/null 2>/dev/null
selfserv with PID 14622 found at Tue Nov 27 19:02:09 EST 2012
selfserv with PID 14622 started at Tue Nov 27 19:02:09 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 100 -C :C00E -N \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:09 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:02:09 EST 2012
ssl.sh: #2815: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 14622 at Tue Nov 27 19:02:09 EST 2012
kill -USR1 14622
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14622 killed at Tue Nov 27 19:02:09 EST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:02:09 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14697 >/dev/null 2>/dev/null
selfserv with PID 14697 found at Tue Nov 27 19:02:09 EST 2012
selfserv with PID 14697 started at Tue Nov 27 19:02:09 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 1000 -C :C013 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:10 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:02:10 EST 2012
ssl.sh: #2816: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 14697 at Tue Nov 27 19:02:10 EST 2012
kill -USR1 14697
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14697 killed at Tue Nov 27 19:02:10 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 19:02:10 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14773 >/dev/null 2>/dev/null
selfserv with PID 14773 found at Tue Nov 27 19:02:10 EST 2012
selfserv with PID 14773 started at Tue Nov 27 19:02:10 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 1000 -C :C004 -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:10 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:02:11 EST 2012
ssl.sh: #2817: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 14773 at Tue Nov 27 19:02:11 EST 2012
kill -USR1 14773
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14773 killed at Tue Nov 27 19:02:11 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:02:11 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14870 >/dev/null 2>/dev/null
selfserv with PID 14870 found at Tue Nov 27 19:02:11 EST 2012
selfserv with PID 14870 started at Tue Nov 27 19:02:11 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:11 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:02:11 EST 2012
ssl.sh: #2818: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 14870 at Tue Nov 27 19:02:11 EST 2012
kill -USR1 14870
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14870 killed at Tue Nov 27 19:02:11 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 19:02:11 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14945 >/dev/null 2>/dev/null
selfserv with PID 14945 found at Tue Nov 27 19:02:11 EST 2012
selfserv with PID 14945 started at Tue Nov 27 19:02:11 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:11 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:02:12 EST 2012
ssl.sh: #2819: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 14945 at Tue Nov 27 19:02:12 EST 2012
kill -USR1 14945
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14945 killed at Tue Nov 27 19:02:12 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:02:12 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15021 >/dev/null 2>/dev/null
selfserv with PID 15021 found at Tue Nov 27 19:02:12 EST 2012
selfserv with PID 15021 started at Tue Nov 27 19:02:12 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:12 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:02:12 EST 2012
ssl.sh: #2820: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 15021 at Tue Nov 27 19:02:12 EST 2012
kill -USR1 15021
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15021 killed at Tue Nov 27 19:02:12 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:02:12 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15096 >/dev/null 2>/dev/null
selfserv with PID 15096 found at Tue Nov 27 19:02:12 EST 2012
selfserv with PID 15096 started at Tue Nov 27 19:02:12 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:12 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:02:13 EST 2012
ssl.sh: #2821: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 15096 at Tue Nov 27 19:02:13 EST 2012
kill -USR1 15096
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15096 killed at Tue Nov 27 19:02:13 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 19:02:13 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15171 >/dev/null 2>/dev/null
selfserv with PID 15171 found at Tue Nov 27 19:02:13 EST 2012
selfserv with PID 15171 started at Tue Nov 27 19:02:13 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:13 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:02:13 EST 2012
ssl.sh: #2822: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 15171 at Tue Nov 27 19:02:13 EST 2012
kill -USR1 15171
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15171 killed at Tue Nov 27 19:02:13 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:02:13 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15247 >/dev/null 2>/dev/null
selfserv with PID 15247 found at Tue Nov 27 19:02:13 EST 2012
selfserv with PID 15247 started at Tue Nov 27 19:02:13 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:02:13 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:02:14 EST 2012
ssl.sh: #2823: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 15247 at Tue Nov 27 19:02:14 EST 2012
kill -USR1 15247
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15247 killed at Tue Nov 27 19:02:14 EST 2012
ssl.sh: SSL - FIPS mode off for server ===============================
ssl.sh: Turning FIPS off for the  server
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -fips false -force
FIPS mode disabled.
ssl.sh: #2824:  (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/server -list
ssl.sh: #2825:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #2826:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
ssl.sh: Turning FIPS off for the extended  server
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -fips false -force
FIPS mode disabled.
ssl.sh: #2827:  (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_server -list
ssl.sh: #2828:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #2829:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
ssl.sh: SSL - FIPS mode on for client ===============================
ssl.sh: Turning FIPS on for the  client
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -fips true -force
FIPS mode enabled.
ssl.sh: #2830:  (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -list
ssl.sh: #2831:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
  1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #2832:  (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: Turning FIPS on for the extended  client
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -fips true -force
FIPS mode enabled.
ssl.sh: #2833:  (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -list
ssl.sh: #2834:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
  1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #2835:  (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: SSL Cipher Coverage  - server normal/client fips  - with ECC ===============================
selfserv starting at Tue Nov 27 19:02:15 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:15 EST 2012
selfserv with PID 15440 started at Tue Nov 27 19:02:15 EST 2012
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2836: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2837: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2838: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2839: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2840: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2841: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2842: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2843: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2844: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2845: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2846: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2847: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2848: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2849: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2850: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2851: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2852: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2853: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2854: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2855: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2856: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2857: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2858: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  f    TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  g    TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2859: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2860: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2861: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2862: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2863: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2864: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2865: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2866: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2867: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2868: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2869: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2870: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2871: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2872: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2873: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2874: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 15440 >/dev/null 2>/dev/null
selfserv with PID 15440 found at Tue Nov 27 19:02:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2875: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 15440 at Tue Nov 27 19:02:23 EST 2012
kill -USR1 15440
selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15440 killed at Tue Nov 27 19:02:23 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:02:23 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16663 >/dev/null 2>/dev/null
selfserv with PID 16663 found at Tue Nov 27 19:02:23 EST 2012
selfserv with PID 16663 started at Tue Nov 27 19:02:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2876: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 16663 >/dev/null 2>/dev/null
selfserv with PID 16663 found at Tue Nov 27 19:02:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2877: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16663 >/dev/null 2>/dev/null
selfserv with PID 16663 found at Tue Nov 27 19:02:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2878: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16663 >/dev/null 2>/dev/null
selfserv with PID 16663 found at Tue Nov 27 19:02:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2879: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16663 >/dev/null 2>/dev/null
selfserv with PID 16663 found at Tue Nov 27 19:02:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2880: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 16663 at Tue Nov 27 19:02:24 EST 2012
kill -USR1 16663
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16663 killed at Tue Nov 27 19:02:24 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:02:24 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:24 EST 2012
selfserv with PID 16811 started at Tue Nov 27 19:02:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2881: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2882: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2883: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2884: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2885: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2886: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2887: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2888: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2889: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2890: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2891: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2892: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2893: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2894: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 16811 >/dev/null 2>/dev/null
selfserv with PID 16811 found at Tue Nov 27 19:02:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2895: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 16811 at Tue Nov 27 19:02:27 EST 2012
kill -USR1 16811
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16811 killed at Tue Nov 27 19:02:27 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:02:27 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17210 >/dev/null 2>/dev/null
selfserv with PID 17210 found at Tue Nov 27 19:02:27 EST 2012
selfserv with PID 17210 started at Tue Nov 27 19:02:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2896: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 17210 >/dev/null 2>/dev/null
selfserv with PID 17210 found at Tue Nov 27 19:02:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2897: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17210 >/dev/null 2>/dev/null
selfserv with PID 17210 found at Tue Nov 27 19:02:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2898: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17210 >/dev/null 2>/dev/null
selfserv with PID 17210 found at Tue Nov 27 19:02:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2899: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17210 >/dev/null 2>/dev/null
selfserv with PID 17210 found at Tue Nov 27 19:02:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2900: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 17210 at Tue Nov 27 19:02:28 EST 2012
kill -USR1 17210
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17210 killed at Tue Nov 27 19:02:28 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:02:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:28 EST 2012
selfserv with PID 17359 started at Tue Nov 27 19:02:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2901: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2902: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2903: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2904: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2905: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2906: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2907: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2908: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2909: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2910: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2911: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2912: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2913: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2914: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17359 >/dev/null 2>/dev/null
selfserv with PID 17359 found at Tue Nov 27 19:02:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2915: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 17359 at Tue Nov 27 19:02:31 EST 2012
kill -USR1 17359
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17359 killed at Tue Nov 27 19:02:31 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:02:31 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17744 >/dev/null 2>/dev/null
selfserv with PID 17744 found at Tue Nov 27 19:02:31 EST 2012
selfserv with PID 17744 started at Tue Nov 27 19:02:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2916: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 17744 >/dev/null 2>/dev/null
selfserv with PID 17744 found at Tue Nov 27 19:02:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2917: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17744 >/dev/null 2>/dev/null
selfserv with PID 17744 found at Tue Nov 27 19:02:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2918: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17744 >/dev/null 2>/dev/null
selfserv with PID 17744 found at Tue Nov 27 19:02:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2919: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17744 >/dev/null 2>/dev/null
selfserv with PID 17744 found at Tue Nov 27 19:02:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2920: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 17744 at Tue Nov 27 19:02:32 EST 2012
kill -USR1 17744
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17744 killed at Tue Nov 27 19:02:32 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:02:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17892 >/dev/null 2>/dev/null
selfserv with PID 17892 found at Tue Nov 27 19:02:33 EST 2012
selfserv with PID 17892 started at Tue Nov 27 19:02:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2921: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 17892 >/dev/null 2>/dev/null
selfserv with PID 17892 found at Tue Nov 27 19:02:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2922: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17892 >/dev/null 2>/dev/null
selfserv with PID 17892 found at Tue Nov 27 19:02:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2923: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17892 >/dev/null 2>/dev/null
selfserv with PID 17892 found at Tue Nov 27 19:02:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2924: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17892 >/dev/null 2>/dev/null
selfserv with PID 17892 found at Tue Nov 27 19:02:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1   \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2925: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17892 at Tue Nov 27 19:02:33 EST 2012
kill -USR1 17892
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17892 killed at Tue Nov 27 19:02:34 EST 2012
ssl.sh: SSL Client Authentication  - server normal/client fips  - with ECC ===============================
ssl.sh: skipping  TLS Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:02:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18098 >/dev/null 2>/dev/null
selfserv with PID 18098 found at Tue Nov 27 19:02:34 EST 2012
selfserv with PID 18098 started at Tue Nov 27 19:02:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2926: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18098 at Tue Nov 27 19:02:34 EST 2012
kill -USR1 18098
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18098 killed at Tue Nov 27 19:02:34 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:02:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18155 >/dev/null 2>/dev/null
selfserv with PID 18155 found at Tue Nov 27 19:02:34 EST 2012
selfserv with PID 18155 started at Tue Nov 27 19:02:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
Incorrect password/PIN entered.
tstclnt: authentication of server cert failed: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #2927: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18155 at Tue Nov 27 19:02:36 EST 2012
kill -USR1 18155
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18155 killed at Tue Nov 27 19:02:36 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:02:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18212 >/dev/null 2>/dev/null
selfserv with PID 18212 found at Tue Nov 27 19:02:36 EST 2012
selfserv with PID 18212 started at Tue Nov 27 19:02:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n TestUser   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2928: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18212 at Tue Nov 27 19:02:36 EST 2012
kill -USR1 18212
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18212 killed at Tue Nov 27 19:02:36 EST 2012
ssl.sh: skipping  SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:02:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18275 >/dev/null 2>/dev/null
selfserv with PID 18275 found at Tue Nov 27 19:02:36 EST 2012
selfserv with PID 18275 started at Tue Nov 27 19:02:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2929: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18275 at Tue Nov 27 19:02:37 EST 2012
kill -USR1 18275
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18275 killed at Tue Nov 27 19:02:37 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:02:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18332 >/dev/null 2>/dev/null
selfserv with PID 18332 found at Tue Nov 27 19:02:37 EST 2012
selfserv with PID 18332 started at Tue Nov 27 19:02:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2930: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18332 at Tue Nov 27 19:02:40 EST 2012
kill -USR1 18332
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18332 killed at Tue Nov 27 19:02:40 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:02:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18389 >/dev/null 2>/dev/null
selfserv with PID 18389 found at Tue Nov 27 19:02:40 EST 2012
selfserv with PID 18389 started at Tue Nov 27 19:02:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2931: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18389 at Tue Nov 27 19:02:40 EST 2012
kill -USR1 18389
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18389 killed at Tue Nov 27 19:02:40 EST 2012
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:02:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18452 >/dev/null 2>/dev/null
selfserv with PID 18452 found at Tue Nov 27 19:02:40 EST 2012
selfserv with PID 18452 started at Tue Nov 27 19:02:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2932: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18452 at Tue Nov 27 19:02:40 EST 2012
kill -USR1 18452
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18452 killed at Tue Nov 27 19:02:40 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:02:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18509 >/dev/null 2>/dev/null
selfserv with PID 18509 found at Tue Nov 27 19:02:40 EST 2012
selfserv with PID 18509 started at Tue Nov 27 19:02:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2933: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18509 at Tue Nov 27 19:02:42 EST 2012
kill -USR1 18509
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18509 killed at Tue Nov 27 19:02:42 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:02:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18566 >/dev/null 2>/dev/null
selfserv with PID 18566 found at Tue Nov 27 19:02:43 EST 2012
selfserv with PID 18566 started at Tue Nov 27 19:02:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2934: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18566 at Tue Nov 27 19:02:43 EST 2012
kill -USR1 18566
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18566 killed at Tue Nov 27 19:02:43 EST 2012
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:02:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18629 >/dev/null 2>/dev/null
selfserv with PID 18629 found at Tue Nov 27 19:02:43 EST 2012
selfserv with PID 18629 started at Tue Nov 27 19:02:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2935: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18629 at Tue Nov 27 19:02:43 EST 2012
kill -USR1 18629
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18629 killed at Tue Nov 27 19:02:43 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:02:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18686 >/dev/null 2>/dev/null
selfserv with PID 18686 found at Tue Nov 27 19:02:43 EST 2012
selfserv with PID 18686 started at Tue Nov 27 19:02:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2936: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18686 at Tue Nov 27 19:02:45 EST 2012
kill -USR1 18686
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18686 killed at Tue Nov 27 19:02:45 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:02:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18743 >/dev/null 2>/dev/null
selfserv with PID 18743 found at Tue Nov 27 19:02:45 EST 2012
selfserv with PID 18743 started at Tue Nov 27 19:02:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2937: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18743 at Tue Nov 27 19:02:45 EST 2012
kill -USR1 18743
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18743 killed at Tue Nov 27 19:02:45 EST 2012
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:02:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18806 >/dev/null 2>/dev/null
selfserv with PID 18806 found at Tue Nov 27 19:02:46 EST 2012
selfserv with PID 18806 started at Tue Nov 27 19:02:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2938: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18806 at Tue Nov 27 19:02:46 EST 2012
kill -USR1 18806
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18806 killed at Tue Nov 27 19:02:46 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:02:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18863 >/dev/null 2>/dev/null
selfserv with PID 18863 found at Tue Nov 27 19:02:46 EST 2012
selfserv with PID 18863 started at Tue Nov 27 19:02:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2939: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18863 at Tue Nov 27 19:02:48 EST 2012
kill -USR1 18863
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18863 killed at Tue Nov 27 19:02:48 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:02:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18920 >/dev/null 2>/dev/null
selfserv with PID 18920 found at Tue Nov 27 19:02:48 EST 2012
selfserv with PID 18920 started at Tue Nov 27 19:02:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2940: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18920 at Tue Nov 27 19:02:48 EST 2012
kill -USR1 18920
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18920 killed at Tue Nov 27 19:02:48 EST 2012
ssl.sh: skipping  TLS Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:02:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18996 >/dev/null 2>/dev/null
selfserv with PID 18996 found at Tue Nov 27 19:02:48 EST 2012
selfserv with PID 18996 started at Tue Nov 27 19:02:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
Incorrect password/PIN entered.
tstclnt: authentication of server cert failed: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #2941: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18996 at Tue Nov 27 19:02:50 EST 2012
kill -USR1 18996
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18996 killed at Tue Nov 27 19:02:50 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:02:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19053 >/dev/null 2>/dev/null
selfserv with PID 19053 found at Tue Nov 27 19:02:51 EST 2012
selfserv with PID 19053 started at Tue Nov 27 19:02:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2942: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19053 at Tue Nov 27 19:02:51 EST 2012
kill -USR1 19053
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19053 killed at Tue Nov 27 19:02:51 EST 2012
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:02:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19114 >/dev/null 2>/dev/null
selfserv with PID 19114 found at Tue Nov 27 19:02:51 EST 2012
selfserv with PID 19114 started at Tue Nov 27 19:02:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2943: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19114 at Tue Nov 27 19:02:54 EST 2012
kill -USR1 19114
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19114 killed at Tue Nov 27 19:02:54 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:02:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19171 >/dev/null 2>/dev/null
selfserv with PID 19171 found at Tue Nov 27 19:02:54 EST 2012
selfserv with PID 19171 started at Tue Nov 27 19:02:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V :ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2944: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19171 at Tue Nov 27 19:02:54 EST 2012
kill -USR1 19171
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19171 killed at Tue Nov 27 19:02:54 EST 2012
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:02:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19232 >/dev/null 2>/dev/null
selfserv with PID 19232 found at Tue Nov 27 19:02:54 EST 2012
selfserv with PID 19232 started at Tue Nov 27 19:02:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2945: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19232 at Tue Nov 27 19:02:57 EST 2012
kill -USR1 19232
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19232 killed at Tue Nov 27 19:02:57 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:02:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19289 >/dev/null 2>/dev/null
selfserv with PID 19289 found at Tue Nov 27 19:02:57 EST 2012
selfserv with PID 19289 started at Tue Nov 27 19:02:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2946: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19289 at Tue Nov 27 19:02:57 EST 2012
kill -USR1 19289
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19289 killed at Tue Nov 27 19:02:57 EST 2012
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:02:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19350 >/dev/null 2>/dev/null
selfserv with PID 19350 found at Tue Nov 27 19:02:57 EST 2012
selfserv with PID 19350 started at Tue Nov 27 19:02:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2947: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19350 at Tue Nov 27 19:02:59 EST 2012
kill -USR1 19350
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19350 killed at Tue Nov 27 19:02:59 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:02:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19407 >/dev/null 2>/dev/null
selfserv with PID 19407 found at Tue Nov 27 19:02:59 EST 2012
selfserv with PID 19407 started at Tue Nov 27 19:02:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:tls1.0 -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2948: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19407 at Tue Nov 27 19:02:59 EST 2012
kill -USR1 19407
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19407 killed at Tue Nov 27 19:02:59 EST 2012
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:02:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:02:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19468 >/dev/null 2>/dev/null
selfserv with PID 19468 found at Tue Nov 27 19:02:59 EST 2012
selfserv with PID 19468 started at Tue Nov 27 19:02:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
Incorrect password/PIN entered.
tstclnt: write to SSL socket failed: No PKCS#11 token could be found to do a required operation.
tstclnt: exiting with return code 254
ssl.sh: #2949: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19468 at Tue Nov 27 19:03:02 EST 2012
kill -USR1 19468
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19468 killed at Tue Nov 27 19:03:02 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:03:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19525 >/dev/null 2>/dev/null
selfserv with PID 19525 found at Tue Nov 27 19:03:02 EST 2012
selfserv with PID 19525 started at Tue Nov 27 19:03:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2950: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19525 at Tue Nov 27 19:03:02 EST 2012
kill -USR1 19525
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19525 killed at Tue Nov 27 19:03:02 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 19:03:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19603 >/dev/null 2>/dev/null
selfserv with PID 19603 found at Tue Nov 27 19:03:02 EST 2012
selfserv with PID 19603 started at Tue Nov 27 19:03:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2951: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19603 at Tue Nov 27 19:03:02 EST 2012
kill -USR1 19603
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19603 killed at Tue Nov 27 19:03:02 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 19:03:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19666 >/dev/null 2>/dev/null
selfserv with PID 19666 found at Tue Nov 27 19:03:02 EST 2012
selfserv with PID 19666 started at Tue Nov 27 19:03:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2952: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19666 at Tue Nov 27 19:03:02 EST 2012
kill -USR1 19666
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19666 killed at Tue Nov 27 19:03:02 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 19:03:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19729 >/dev/null 2>/dev/null
selfserv with PID 19729 found at Tue Nov 27 19:03:03 EST 2012
selfserv with PID 19729 started at Tue Nov 27 19:03:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2953: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19729 at Tue Nov 27 19:03:03 EST 2012
kill -USR1 19729
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19729 killed at Tue Nov 27 19:03:03 EST 2012
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Tue Nov 27 19:03:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19792 >/dev/null 2>/dev/null
selfserv with PID 19792 found at Tue Nov 27 19:03:03 EST 2012
selfserv with PID 19792 started at Tue Nov 27 19:03:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2954: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19792 at Tue Nov 27 19:03:03 EST 2012
kill -USR1 19792
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19792 killed at Tue Nov 27 19:03:03 EST 2012
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Tue Nov 27 19:03:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19855 >/dev/null 2>/dev/null
selfserv with PID 19855 found at Tue Nov 27 19:03:03 EST 2012
selfserv with PID 19855 started at Tue Nov 27 19:03:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3:ssl3 -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #2955: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19855 at Tue Nov 27 19:03:03 EST 2012
kill -USR1 19855
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19855 killed at Tue Nov 27 19:03:03 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 19:03:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19918 >/dev/null 2>/dev/null
selfserv with PID 19918 found at Tue Nov 27 19:03:03 EST 2012
selfserv with PID 19918 started at Tue Nov 27 19:03:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2956: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19918 at Tue Nov 27 19:03:03 EST 2012
kill -USR1 19918
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19918 killed at Tue Nov 27 19:03:03 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 19:03:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19981 >/dev/null 2>/dev/null
selfserv with PID 19981 found at Tue Nov 27 19:03:03 EST 2012
selfserv with PID 19981 started at Tue Nov 27 19:03:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2957: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19981 at Tue Nov 27 19:03:04 EST 2012
kill -USR1 19981
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19981 killed at Tue Nov 27 19:03:04 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Tue Nov 27 19:03:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20044 >/dev/null 2>/dev/null
selfserv with PID 20044 found at Tue Nov 27 19:03:04 EST 2012
selfserv with PID 20044 started at Tue Nov 27 19:03:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s).
tstclnt: exiting with return code 1
ssl.sh: #2958: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20044 at Tue Nov 27 19:03:04 EST 2012
kill -USR1 20044
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20044 killed at Tue Nov 27 19:03:04 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Tue Nov 27 19:03:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20107 >/dev/null 2>/dev/null
selfserv with PID 20107 found at Tue Nov 27 19:03:04 EST 2012
selfserv with PID 20107 started at Tue Nov 27 19:03:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #2959: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20107 at Tue Nov 27 19:03:04 EST 2012
kill -USR1 20107
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20107 killed at Tue Nov 27 19:03:04 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 19:03:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20170 >/dev/null 2>/dev/null
selfserv with PID 20170 found at Tue Nov 27 19:03:04 EST 2012
selfserv with PID 20170 started at Tue Nov 27 19:03:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v  \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2960: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20170 at Tue Nov 27 19:03:04 EST 2012
kill -USR1 20170
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20170 killed at Tue Nov 27 19:03:04 EST 2012
ssl.sh: SSL Stress Test  - server normal/client fips  - with ECC ===============================
ssl.sh: skipping  Form is subject to the terms of the Mozilla Public (non-FIPS only)
ssl.sh: skipping  If a copy of the MPL was not distributed with this (non-FIPS only)
ssl.sh: skipping  obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  the stress tests for SSL/TLS. (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  client                         Test Case name (non-FIPS only)
ssl.sh: skipping  params (non-FIPS only)
ssl.sh: skipping  ------                         --------------- (non-FIPS only)
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress SSL3 RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (false start) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (compression) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket, compression) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only)
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) (non-FIPS only)
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:03:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20325 >/dev/null 2>/dev/null
selfserv with PID 20325 found at Tue Nov 27 19:03:05 EST 2012
selfserv with PID 20325 started at Tue Nov 27 19:03:05 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:05 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:03:05 EST 2012
ssl.sh: #2961: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20325 at Tue Nov 27 19:03:05 EST 2012
kill -USR1 20325
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20325 killed at Tue Nov 27 19:03:05 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:03:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20400 >/dev/null 2>/dev/null
selfserv with PID 20400 found at Tue Nov 27 19:03:05 EST 2012
selfserv with PID 20400 started at Tue Nov 27 19:03:05 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 100 -C c -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:05 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:03:06 EST 2012
ssl.sh: #2962: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20400 at Tue Nov 27 19:03:06 EST 2012
kill -USR1 20400
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20400 killed at Tue Nov 27 19:03:06 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:03:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20475 >/dev/null 2>/dev/null
selfserv with PID 20475 found at Tue Nov 27 19:03:06 EST 2012
selfserv with PID 20475 started at Tue Nov 27 19:03:06 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:06 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:03:06 EST 2012
ssl.sh: #2963: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20475 at Tue Nov 27 19:03:06 EST 2012
kill -USR1 20475
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20475 killed at Tue Nov 27 19:03:06 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 19:03:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20551 >/dev/null 2>/dev/null
selfserv with PID 20551 found at Tue Nov 27 19:03:06 EST 2012
selfserv with PID 20551 started at Tue Nov 27 19:03:06 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:06 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:03:07 EST 2012
ssl.sh: #2964: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20551 at Tue Nov 27 19:03:07 EST 2012
kill -USR1 20551
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20551 killed at Tue Nov 27 19:03:07 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:03:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20627 >/dev/null 2>/dev/null
selfserv with PID 20627 found at Tue Nov 27 19:03:07 EST 2012
selfserv with PID 20627 started at Tue Nov 27 19:03:07 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:07 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:03:07 EST 2012
ssl.sh: #2965: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20627 at Tue Nov 27 19:03:07 EST 2012
kill -USR1 20627
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20627 killed at Tue Nov 27 19:03:07 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 19:03:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20703 >/dev/null 2>/dev/null
selfserv with PID 20703 found at Tue Nov 27 19:03:07 EST 2012
selfserv with PID 20703 started at Tue Nov 27 19:03:07 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:07 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:03:07 EST 2012
ssl.sh: #2966: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20703 at Tue Nov 27 19:03:07 EST 2012
kill -USR1 20703
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20703 killed at Tue Nov 27 19:03:07 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:03:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20779 >/dev/null 2>/dev/null
selfserv with PID 20779 found at Tue Nov 27 19:03:07 EST 2012
selfserv with PID 20779 started at Tue Nov 27 19:03:07 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:07 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:03:08 EST 2012
ssl.sh: #2967: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20779 at Tue Nov 27 19:03:08 EST 2012
kill -USR1 20779
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20779 killed at Tue Nov 27 19:03:08 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Tue Nov 27 19:03:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20861 >/dev/null 2>/dev/null
selfserv with PID 20861 found at Tue Nov 27 19:03:08 EST 2012
selfserv with PID 20861 started at Tue Nov 27 19:03:08 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:08 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:03:08 EST 2012
ssl.sh: #2968: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20861 at Tue Nov 27 19:03:08 EST 2012
kill -USR1 20861
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20861 killed at Tue Nov 27 19:03:08 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Tue Nov 27 19:03:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -k buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20943 >/dev/null 2>/dev/null
selfserv with PID 20943 found at Tue Nov 27 19:03:08 EST 2012
selfserv with PID 20943 started at Tue Nov 27 19:03:08 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V tls1.0: -c 1000 -C c -u -a buildnss02-sni.usersys.redhat.com \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:08 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:03:09 EST 2012
ssl.sh: #2969: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 20943 at Tue Nov 27 19:03:09 EST 2012
kill -USR1 20943
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20943 killed at Tue Nov 27 19:03:09 EST 2012
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  ############################ (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 CBC with SHA (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:03:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21067 >/dev/null 2>/dev/null
selfserv with PID 21067 found at Tue Nov 27 19:03:09 EST 2012
selfserv with PID 21067 started at Tue Nov 27 19:03:09 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:09 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:03:09 EST 2012
ssl.sh: #2970: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21067 at Tue Nov 27 19:03:09 EST 2012
kill -USR1 21067
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21067 killed at Tue Nov 27 19:03:09 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 19:03:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21142 >/dev/null 2>/dev/null
selfserv with PID 21142 found at Tue Nov 27 19:03:09 EST 2012
selfserv with PID 21142 started at Tue Nov 27 19:03:09 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:09 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:03:10 EST 2012
ssl.sh: #2971: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21142 at Tue Nov 27 19:03:10 EST 2012
kill -USR1 21142
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21142 killed at Tue Nov 27 19:03:10 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:03:10 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21218 >/dev/null 2>/dev/null
selfserv with PID 21218 found at Tue Nov 27 19:03:10 EST 2012
selfserv with PID 21218 started at Tue Nov 27 19:03:10 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 10 -C :C004 -N -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:10 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:03:10 EST 2012
ssl.sh: #2972: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21218 at Tue Nov 27 19:03:10 EST 2012
kill -USR1 21218
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21218 killed at Tue Nov 27 19:03:10 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:03:10 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21293 >/dev/null 2>/dev/null
selfserv with PID 21293 found at Tue Nov 27 19:03:10 EST 2012
selfserv with PID 21293 started at Tue Nov 27 19:03:10 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:10 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:03:11 EST 2012
ssl.sh: #2973: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21293 at Tue Nov 27 19:03:11 EST 2012
kill -USR1 21293
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21293 killed at Tue Nov 27 19:03:11 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 19:03:11 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21368 >/dev/null 2>/dev/null
selfserv with PID 21368 found at Tue Nov 27 19:03:11 EST 2012
selfserv with PID 21368 started at Tue Nov 27 19:03:11 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -c 100 -C :C013 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:11 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:03:11 EST 2012
ssl.sh: #2974: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21368 at Tue Nov 27 19:03:11 EST 2012
kill -USR1 21368
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21368 killed at Tue Nov 27 19:03:11 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:03:11 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21444 >/dev/null 2>/dev/null
selfserv with PID 21444 found at Tue Nov 27 19:03:11 EST 2012
selfserv with PID 21444 started at Tue Nov 27 19:03:11 EST 2012
strsclnt -q -p 8543 -d ../client  -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:03:11 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:03:11 EST 2012
ssl.sh: #2975: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 21444 at Tue Nov 27 19:03:11 EST 2012
kill -USR1 21444
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21444 killed at Tue Nov 27 19:03:11 EST 2012
ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips  - with ECC ===============================
selfserv starting at Tue Nov 27 19:03:11 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:11 EST 2012
selfserv with PID 21507 started at Tue Nov 27 19:03:11 EST 2012
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2976: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2977: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2978: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2979: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2980: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2981: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2982: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2983: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2984: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2985: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2986: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2987: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2988: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2989: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2990: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2991: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2992: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2993: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2994: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2995: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2996: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2997: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2998: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  f    TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping  g    TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2999: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3000: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3001: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) (non-FIPS only)
ssl.sh: skipping  TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3002: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3003: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3004: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3005: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3006: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3007: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3008: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3009: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3010: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3011: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3012: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3013: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3014: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 21507 >/dev/null 2>/dev/null
selfserv with PID 21507 found at Tue Nov 27 19:03:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3015: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 21507 at Tue Nov 27 19:03:20 EST 2012
kill -USR1 21507
selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21507 killed at Tue Nov 27 19:03:20 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:03:20 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22730 >/dev/null 2>/dev/null
selfserv with PID 22730 found at Tue Nov 27 19:03:20 EST 2012
selfserv with PID 22730 started at Tue Nov 27 19:03:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3016: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22730 >/dev/null 2>/dev/null
selfserv with PID 22730 found at Tue Nov 27 19:03:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3017: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22730 >/dev/null 2>/dev/null
selfserv with PID 22730 found at Tue Nov 27 19:03:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3018: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22730 >/dev/null 2>/dev/null
selfserv with PID 22730 found at Tue Nov 27 19:03:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3019: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22730 >/dev/null 2>/dev/null
selfserv with PID 22730 found at Tue Nov 27 19:03:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3020: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 22730 at Tue Nov 27 19:03:21 EST 2012
kill -USR1 22730
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22730 killed at Tue Nov 27 19:03:21 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:03:21 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:21 EST 2012
selfserv with PID 22878 started at Tue Nov 27 19:03:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3021: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3022: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3023: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3024: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3025: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3026: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3027: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3028: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3029: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3030: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3031: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3032: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3033: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3034: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22878 >/dev/null 2>/dev/null
selfserv with PID 22878 found at Tue Nov 27 19:03:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3035: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 22878 at Tue Nov 27 19:03:24 EST 2012
kill -USR1 22878
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22878 killed at Tue Nov 27 19:03:24 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:03:24 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23277 >/dev/null 2>/dev/null
selfserv with PID 23277 found at Tue Nov 27 19:03:24 EST 2012
selfserv with PID 23277 started at Tue Nov 27 19:03:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3036: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23277 >/dev/null 2>/dev/null
selfserv with PID 23277 found at Tue Nov 27 19:03:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3037: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23277 >/dev/null 2>/dev/null
selfserv with PID 23277 found at Tue Nov 27 19:03:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3038: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23277 >/dev/null 2>/dev/null
selfserv with PID 23277 found at Tue Nov 27 19:03:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3039: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23277 >/dev/null 2>/dev/null
selfserv with PID 23277 found at Tue Nov 27 19:03:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3040: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 23277 at Tue Nov 27 19:03:25 EST 2012
kill -USR1 23277
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23277 killed at Tue Nov 27 19:03:25 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:03:25 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:25 EST 2012
selfserv with PID 23425 started at Tue Nov 27 19:03:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3041: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3042: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3043: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3044: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3045: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3046: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3047: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3048: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3049: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3050: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3051: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3052: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3053: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3054: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23425 >/dev/null 2>/dev/null
selfserv with PID 23425 found at Tue Nov 27 19:03:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3055: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 23425 at Tue Nov 27 19:03:29 EST 2012
kill -USR1 23425
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23425 killed at Tue Nov 27 19:03:29 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:03:29 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23810 >/dev/null 2>/dev/null
selfserv with PID 23810 found at Tue Nov 27 19:03:29 EST 2012
selfserv with PID 23810 started at Tue Nov 27 19:03:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3056: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23810 >/dev/null 2>/dev/null
selfserv with PID 23810 found at Tue Nov 27 19:03:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3057: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23810 >/dev/null 2>/dev/null
selfserv with PID 23810 found at Tue Nov 27 19:03:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3058: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23810 >/dev/null 2>/dev/null
selfserv with PID 23810 found at Tue Nov 27 19:03:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3059: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23810 >/dev/null 2>/dev/null
selfserv with PID 23810 found at Tue Nov 27 19:03:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3060: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 23810 at Tue Nov 27 19:03:30 EST 2012
kill -USR1 23810
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23810 killed at Tue Nov 27 19:03:30 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:03:30 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23958 >/dev/null 2>/dev/null
selfserv with PID 23958 found at Tue Nov 27 19:03:30 EST 2012
selfserv with PID 23958 started at Tue Nov 27 19:03:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3061: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23958 >/dev/null 2>/dev/null
selfserv with PID 23958 found at Tue Nov 27 19:03:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3062: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23958 >/dev/null 2>/dev/null
selfserv with PID 23958 found at Tue Nov 27 19:03:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3063: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23958 >/dev/null 2>/dev/null
selfserv with PID 23958 found at Tue Nov 27 19:03:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3064: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23958 >/dev/null 2>/dev/null
selfserv with PID 23958 found at Tue Nov 27 19:03:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1   \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3065: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23958 at Tue Nov 27 19:03:31 EST 2012
kill -USR1 23958
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23958 killed at Tue Nov 27 19:03:31 EST 2012
ssl.sh: SSL Client Authentication Extended Test - server normal/client fips  - with ECC ===============================
ssl.sh: skipping  TLS Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:03:31 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24163 >/dev/null 2>/dev/null
selfserv with PID 24163 found at Tue Nov 27 19:03:31 EST 2012
selfserv with PID 24163 started at Tue Nov 27 19:03:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3066: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24163 at Tue Nov 27 19:03:31 EST 2012
kill -USR1 24163
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24163 killed at Tue Nov 27 19:03:31 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:03:31 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24220 >/dev/null 2>/dev/null
selfserv with PID 24220 found at Tue Nov 27 19:03:31 EST 2012
selfserv with PID 24220 started at Tue Nov 27 19:03:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
Incorrect password/PIN entered.
tstclnt: authentication of server cert failed: Peer's certificate has an invalid signature.
tstclnt: exiting with return code 254
ssl.sh: #3067: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24220 at Tue Nov 27 19:03:33 EST 2012
kill -USR1 24220
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24220 killed at Tue Nov 27 19:03:33 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:03:33 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:03:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3068: Waiting for Server - FAILED
kill -0 24277 >/dev/null 2>/dev/null
selfserv with PID 24277 found at Tue Nov 27 19:03:42 EST 2012
selfserv with PID 24277 started at Tue Nov 27 19:03:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3069: TLS Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 24277 at Tue Nov 27 19:03:42 EST 2012
kill -USR1 24277
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24277 killed at Tue Nov 27 19:03:42 EST 2012
ssl.sh: skipping  SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:03:42 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:03:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3070: Waiting for Server - FAILED
kill -0 24352 >/dev/null 2>/dev/null
selfserv with PID 24352 found at Tue Nov 27 19:03:48 EST 2012
selfserv with PID 24352 started at Tue Nov 27 19:03:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3071: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24352 at Tue Nov 27 19:03:48 EST 2012
kill -USR1 24352
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24352 killed at Tue Nov 27 19:03:48 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:03:48 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:03:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3072: Waiting for Server - FAILED
kill -0 24421 >/dev/null 2>/dev/null
selfserv with PID 24421 found at Tue Nov 27 19:03:53 EST 2012
selfserv with PID 24421 started at Tue Nov 27 19:03:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3073: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24421 at Tue Nov 27 19:03:53 EST 2012
kill -USR1 24421
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24421 killed at Tue Nov 27 19:03:53 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:03:53 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:03:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3074: Waiting for Server - FAILED
kill -0 24490 >/dev/null 2>/dev/null
selfserv with PID 24490 found at Tue Nov 27 19:03:58 EST 2012
selfserv with PID 24490 started at Tue Nov 27 19:03:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3075: SSL3 Require client auth (client auth) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 24490 at Tue Nov 27 19:03:58 EST 2012
kill -USR1 24490
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24490 killed at Tue Nov 27 19:03:58 EST 2012
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:03:58 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:03:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:04:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3076: Waiting for Server - FAILED
kill -0 24565 >/dev/null 2>/dev/null
selfserv with PID 24565 found at Tue Nov 27 19:04:03 EST 2012
selfserv with PID 24565 started at Tue Nov 27 19:04:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3077: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24565 at Tue Nov 27 19:04:03 EST 2012
kill -USR1 24565
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24565 killed at Tue Nov 27 19:04:03 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:04:03 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:04:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:04:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3078: Waiting for Server - FAILED
kill -0 24644 >/dev/null 2>/dev/null
selfserv with PID 24644 found at Tue Nov 27 19:04:08 EST 2012
selfserv with PID 24644 started at Tue Nov 27 19:04:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3079: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24644 at Tue Nov 27 19:04:08 EST 2012
kill -USR1 24644
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24644 killed at Tue Nov 27 19:04:08 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:04:09 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:04:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:04:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3080: Waiting for Server - FAILED
kill -0 24713 >/dev/null 2>/dev/null
selfserv with PID 24713 found at Tue Nov 27 19:04:14 EST 2012
selfserv with PID 24713 started at Tue Nov 27 19:04:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3081: TLS Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 24713 at Tue Nov 27 19:04:14 EST 2012
kill -USR1 24713
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24713 killed at Tue Nov 27 19:04:14 EST 2012
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:04:14 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:04:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:04:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3082: Waiting for Server - FAILED
kill -0 24788 >/dev/null 2>/dev/null
selfserv with PID 24788 found at Tue Nov 27 19:04:19 EST 2012
selfserv with PID 24788 started at Tue Nov 27 19:04:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3083: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24788 at Tue Nov 27 19:04:19 EST 2012
kill -USR1 24788
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24788 killed at Tue Nov 27 19:04:19 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:04:19 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:04:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:04:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3084: Waiting for Server - FAILED
kill -0 24857 >/dev/null 2>/dev/null
selfserv with PID 24857 found at Tue Nov 27 19:04:24 EST 2012
selfserv with PID 24857 started at Tue Nov 27 19:04:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3085: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24857 at Tue Nov 27 19:04:24 EST 2012
kill -USR1 24857
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24857 killed at Tue Nov 27 19:04:24 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:04:24 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:04:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:04:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3086: Waiting for Server - FAILED
kill -0 24926 >/dev/null 2>/dev/null
selfserv with PID 24926 found at Tue Nov 27 19:04:29 EST 2012
selfserv with PID 24926 started at Tue Nov 27 19:04:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3087: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 24926 at Tue Nov 27 19:04:29 EST 2012
kill -USR1 24926
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24926 killed at Tue Nov 27 19:04:29 EST 2012
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:04:29 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:04:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:04:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3088: Waiting for Server - FAILED
kill -0 25001 >/dev/null 2>/dev/null
selfserv with PID 25001 found at Tue Nov 27 19:04:34 EST 2012
selfserv with PID 25001 started at Tue Nov 27 19:04:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3089: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25001 at Tue Nov 27 19:04:34 EST 2012
kill -USR1 25001
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25001 killed at Tue Nov 27 19:04:34 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:04:34 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:04:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:04:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3090: Waiting for Server - FAILED
kill -0 25070 >/dev/null 2>/dev/null
selfserv with PID 25070 found at Tue Nov 27 19:04:40 EST 2012
selfserv with PID 25070 started at Tue Nov 27 19:04:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3091: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25070 at Tue Nov 27 19:04:40 EST 2012
kill -USR1 25070
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25070 killed at Tue Nov 27 19:04:40 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:04:40 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:04:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:04:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3092: Waiting for Server - FAILED
kill -0 25139 >/dev/null 2>/dev/null
selfserv with PID 25139 found at Tue Nov 27 19:04:45 EST 2012
selfserv with PID 25139 started at Tue Nov 27 19:04:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3093: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 25139 at Tue Nov 27 19:04:45 EST 2012
kill -USR1 25139
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25139 killed at Tue Nov 27 19:04:45 EST 2012
ssl.sh: skipping  TLS Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:04:45 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:04:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:04:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3094: Waiting for Server - FAILED
kill -0 25227 >/dev/null 2>/dev/null
selfserv with PID 25227 found at Tue Nov 27 19:04:50 EST 2012
selfserv with PID 25227 started at Tue Nov 27 19:04:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3095: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25227 at Tue Nov 27 19:04:50 EST 2012
kill -USR1 25227
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25227 killed at Tue Nov 27 19:04:50 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:04:50 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:04:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:04:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3096: Waiting for Server - FAILED
kill -0 25296 >/dev/null 2>/dev/null
selfserv with PID 25296 found at Tue Nov 27 19:04:55 EST 2012
selfserv with PID 25296 started at Tue Nov 27 19:04:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3097: TLS Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 25296 at Tue Nov 27 19:04:55 EST 2012
kill -USR1 25296
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25296 killed at Tue Nov 27 19:04:55 EST 2012
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:04:55 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:04:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:05:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3098: Waiting for Server - FAILED
kill -0 25369 >/dev/null 2>/dev/null
selfserv with PID 25369 found at Tue Nov 27 19:05:01 EST 2012
selfserv with PID 25369 started at Tue Nov 27 19:05:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3099: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25369 at Tue Nov 27 19:05:01 EST 2012
kill -USR1 25369
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25369 killed at Tue Nov 27 19:05:01 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:05:01 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:05:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:05:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3100: Waiting for Server - FAILED
kill -0 25438 >/dev/null 2>/dev/null
selfserv with PID 25438 found at Tue Nov 27 19:05:06 EST 2012
selfserv with PID 25438 started at Tue Nov 27 19:05:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3101: SSL3 Require client auth (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 25438 at Tue Nov 27 19:05:06 EST 2012
kill -USR1 25438
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25438 killed at Tue Nov 27 19:05:06 EST 2012
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:05:06 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:05:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:05:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3102: Waiting for Server - FAILED
kill -0 25511 >/dev/null 2>/dev/null
selfserv with PID 25511 found at Tue Nov 27 19:05:11 EST 2012
selfserv with PID 25511 started at Tue Nov 27 19:05:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3103: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25511 at Tue Nov 27 19:05:11 EST 2012
kill -USR1 25511
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25511 killed at Tue Nov 27 19:05:11 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:05:11 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:05:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:05:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3104: Waiting for Server - FAILED
kill -0 25580 >/dev/null 2>/dev/null
selfserv with PID 25580 found at Tue Nov 27 19:05:16 EST 2012
selfserv with PID 25580 started at Tue Nov 27 19:05:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3: -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3105: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 25580 at Tue Nov 27 19:05:16 EST 2012
kill -USR1 25580
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25580 killed at Tue Nov 27 19:05:16 EST 2012
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:05:16 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:05:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:05:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3106: Waiting for Server - FAILED
kill -0 25653 >/dev/null 2>/dev/null
selfserv with PID 25653 found at Tue Nov 27 19:05:21 EST 2012
selfserv with PID 25653 started at Tue Nov 27 19:05:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3107: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25653 at Tue Nov 27 19:05:21 EST 2012
kill -USR1 25653
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25653 killed at Tue Nov 27 19:05:21 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:05:21 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:05:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:05:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3108: Waiting for Server - FAILED
kill -0 25722 >/dev/null 2>/dev/null
selfserv with PID 25722 found at Tue Nov 27 19:05:26 EST 2012
selfserv with PID 25722 started at Tue Nov 27 19:05:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3109: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 25722 at Tue Nov 27 19:05:27 EST 2012
kill -USR1 25722
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25722 killed at Tue Nov 27 19:05:27 EST 2012
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only)
ssl.sh: skipping  SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only)
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:05:27 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:05:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:05:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3110: Waiting for Server - FAILED
kill -0 25795 >/dev/null 2>/dev/null
selfserv with PID 25795 found at Tue Nov 27 19:05:32 EST 2012
selfserv with PID 25795 started at Tue Nov 27 19:05:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3111: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25795 at Tue Nov 27 19:05:32 EST 2012
kill -USR1 25795
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25795 killed at Tue Nov 27 19:05:32 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:05:32 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:05:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:05:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3112: Waiting for Server - FAILED
kill -0 25864 >/dev/null 2>/dev/null
selfserv with PID 25864 found at Tue Nov 27 19:05:37 EST 2012
selfserv with PID 25864 started at Tue Nov 27 19:05:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v  \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3113: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 25864 at Tue Nov 27 19:05:37 EST 2012
kill -USR1 25864
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25864 killed at Tue Nov 27 19:05:37 EST 2012
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: SSL Stress Test Extended Test - server normal/client fips  - with ECC ===============================
ssl.sh: skipping  Form is subject to the terms of the Mozilla Public (non-FIPS only)
ssl.sh: skipping  If a copy of the MPL was not distributed with this (non-FIPS only)
ssl.sh: skipping  obtain one at http://mozilla.org/MPL/2.0/. (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  the stress tests for SSL/TLS. (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  client                         Test Case name (non-FIPS only)
ssl.sh: skipping  params (non-FIPS only)
ssl.sh: skipping  ------                         --------------- (non-FIPS only)
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: skipping  Stress SSL3 RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (false start) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (compression) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket, compression) (non-FIPS only)
ssl.sh: skipping  Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) (non-FIPS only)
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:05:37 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:05:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:05:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3114: Waiting for Server - FAILED
kill -0 26065 >/dev/null 2>/dev/null
selfserv with PID 26065 found at Tue Nov 27 19:05:42 EST 2012
selfserv with PID 26065 started at Tue Nov 27 19:05:42 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:05:42 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt: NoReuse - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:05:42 EST 2012
ssl.sh: #3115: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0.  - FAILED
trying to kill selfserv with PID 26065 at Tue Nov 27 19:05:42 EST 2012
kill -USR1 26065
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26065 killed at Tue Nov 27 19:05:42 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:05:42 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:05:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:05:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3116: Waiting for Server - FAILED
kill -0 26144 >/dev/null 2>/dev/null
selfserv with PID 26144 found at Tue Nov 27 19:05:47 EST 2012
selfserv with PID 26144 started at Tue Nov 27 19:05:47 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 100 -C c -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:05:47 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt: NoReuse - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:05:48 EST 2012
ssl.sh: #3117: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 1, expected is 0.  - FAILED
trying to kill selfserv with PID 26144 at Tue Nov 27 19:05:48 EST 2012
kill -USR1 26144
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26144 killed at Tue Nov 27 19:05:48 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:05:48 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:05:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:05:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3118: Waiting for Server - FAILED
kill -0 26223 >/dev/null 2>/dev/null
selfserv with PID 26223 found at Tue Nov 27 19:05:53 EST 2012
selfserv with PID 26223 started at Tue Nov 27 19:05:53 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:05:53 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:05:53 EST 2012
ssl.sh: #3119: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 1, expected is 0.  - FAILED
trying to kill selfserv with PID 26223 at Tue Nov 27 19:05:53 EST 2012
kill -USR1 26223
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26223 killed at Tue Nov 27 19:05:53 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 19:05:53 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:05:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:05:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3120: Waiting for Server - FAILED
kill -0 26302 >/dev/null 2>/dev/null
selfserv with PID 26302 found at Tue Nov 27 19:05:58 EST 2012
selfserv with PID 26302 started at Tue Nov 27 19:05:58 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:05:58 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:05:58 EST 2012
ssl.sh: #3121: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26302 at Tue Nov 27 19:05:58 EST 2012
kill -USR1 26302
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26302 killed at Tue Nov 27 19:05:58 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:05:58 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:05:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:06:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3122: Waiting for Server - FAILED
kill -0 26381 >/dev/null 2>/dev/null
selfserv with PID 26381 found at Tue Nov 27 19:06:03 EST 2012
selfserv with PID 26381 started at Tue Nov 27 19:06:03 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:06:03 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:06:03 EST 2012
ssl.sh: #3123: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26381 at Tue Nov 27 19:06:03 EST 2012
kill -USR1 26381
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26381 killed at Tue Nov 27 19:06:03 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 19:06:03 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:06:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:06:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3124: Waiting for Server - FAILED
kill -0 26470 >/dev/null 2>/dev/null
selfserv with PID 26470 found at Tue Nov 27 19:06:09 EST 2012
selfserv with PID 26470 started at Tue Nov 27 19:06:09 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:06:09 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:06:09 EST 2012
ssl.sh: #3125: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 1, expected is 0.  - FAILED
trying to kill selfserv with PID 26470 at Tue Nov 27 19:06:09 EST 2012
kill -USR1 26470
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26470 killed at Tue Nov 27 19:06:09 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:06:09 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:06:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:06:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3126: Waiting for Server - FAILED
kill -0 26549 >/dev/null 2>/dev/null
selfserv with PID 26549 found at Tue Nov 27 19:06:14 EST 2012
selfserv with PID 26549 started at Tue Nov 27 19:06:14 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:06:14 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:06:14 EST 2012
ssl.sh: #3127: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 1, expected is 0.  - FAILED
trying to kill selfserv with PID 26549 at Tue Nov 27 19:06:14 EST 2012
kill -USR1 26549
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26549 killed at Tue Nov 27 19:06:14 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  ############################ (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDHE-RSA   AES 128 CBC with SHA (non-FIPS only)
ssl.sh: skipping  Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: skipping  versions here... (non-FIPS only)
ssl.sh: skipping   (non-FIPS only)
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:06:14 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:06:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:06:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3128: Waiting for Server - FAILED
kill -0 26684 >/dev/null 2>/dev/null
selfserv with PID 26684 found at Tue Nov 27 19:06:19 EST 2012
selfserv with PID 26684 started at Tue Nov 27 19:06:19 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:06:19 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt: NoReuse - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:06:19 EST 2012
ssl.sh: #3129: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0.  - FAILED
trying to kill selfserv with PID 26684 at Tue Nov 27 19:06:19 EST 2012
kill -USR1 26684
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26684 killed at Tue Nov 27 19:06:19 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 19:06:19 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:06:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:06:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3130: Waiting for Server - FAILED
kill -0 26763 >/dev/null 2>/dev/null
selfserv with PID 26763 found at Tue Nov 27 19:06:25 EST 2012
selfserv with PID 26763 started at Tue Nov 27 19:06:25 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:06:25 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:06:25 EST 2012
ssl.sh: #3131: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26763 at Tue Nov 27 19:06:25 EST 2012
kill -USR1 26763
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26763 killed at Tue Nov 27 19:06:25 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:06:25 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:06:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:06:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3132: Waiting for Server - FAILED
kill -0 26842 >/dev/null 2>/dev/null
selfserv with PID 26842 found at Tue Nov 27 19:06:30 EST 2012
selfserv with PID 26842 started at Tue Nov 27 19:06:30 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:06:30 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt: NoReuse - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:06:30 EST 2012
ssl.sh: #3133: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0.  - FAILED
trying to kill selfserv with PID 26842 at Tue Nov 27 19:06:30 EST 2012
kill -USR1 26842
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26842 killed at Tue Nov 27 19:06:30 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:06:30 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:06:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:06:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3134: Waiting for Server - FAILED
kill -0 26921 >/dev/null 2>/dev/null
selfserv with PID 26921 found at Tue Nov 27 19:06:35 EST 2012
selfserv with PID 26921 started at Tue Nov 27 19:06:35 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:06:35 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt: NoReuse - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:06:35 EST 2012
ssl.sh: #3135: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 1, expected is 0.  - FAILED
trying to kill selfserv with PID 26921 at Tue Nov 27 19:06:35 EST 2012
kill -USR1 26921
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26921 killed at Tue Nov 27 19:06:35 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 19:06:35 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:06:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:06:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3136: Waiting for Server - FAILED
kill -0 27000 >/dev/null 2>/dev/null
selfserv with PID 27000 found at Tue Nov 27 19:06:40 EST 2012
selfserv with PID 27000 started at Tue Nov 27 19:06:40 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:06:40 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:06:41 EST 2012
ssl.sh: #3137: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27000 at Tue Nov 27 19:06:41 EST 2012
kill -USR1 27000
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27000 killed at Tue Nov 27 19:06:41 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:06:41 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:06:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:06:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #3138: Waiting for Server - FAILED
kill -0 27079 >/dev/null 2>/dev/null
selfserv with PID 27079 found at Tue Nov 27 19:06:46 EST 2012
selfserv with PID 27079 started at Tue Nov 27 19:06:46 EST 2012
strsclnt -q -p 8543 -d ../ext_client  -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:06:46 EST 2012
strsclnt: error looking up host: A directory lookup on a network address has failed
strsclnt: SSL2 - 0 server certificates tested.
strsclnt completed at Tue Nov 27 19:06:46 EST 2012
ssl.sh: #3139: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 1, expected is 0.  - FAILED
trying to kill selfserv with PID 27079 at Tue Nov 27 19:06:46 EST 2012
kill -USR1 27079
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27079 killed at Tue Nov 27 19:06:46 EST 2012
ssl.sh: SSL - FIPS mode off for client ===============================
ssl.sh: Turning FIPS off for the  client
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -fips false -force
FIPS mode disabled.
ssl.sh: #3140:  (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/client -list
ssl.sh: #3141:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #3142:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
ssl.sh: Turning FIPS off for the extended  client
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -fips false -force
FIPS mode disabled.
ssl.sh: #3143:  (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/ext_client -list
ssl.sh: #3144:  (modutil -list) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: #3145:  (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED
TIMESTAMP ssl END: Tue Nov 27 19:06:46 EST 2012
Running tests for ocsp
TIMESTAMP ocsp BEGIN: Tue Nov 27 19:06:46 EST 2012
ocsp.sh: OCSP tests ===============================
TIMESTAMP ocsp END: Tue Nov 27 19:06:46 EST 2012
Running tests for merge
TIMESTAMP merge BEGIN: Tue Nov 27 19:06:46 EST 2012
merge.sh: Merge Tests ===============================
merge.sh: Creating an SDR key & Encrypt
sdrtest -d . -o /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests.v3.12297 -t Test2 -f ../tests.pw
merge.sh: #3146: Creating SDR Key  - PASSED
merge.sh: Merging in Key for Existing user
certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3147: Merging Dave  - PASSED
merge.sh: Merging in new user 
certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3148: Merging server  - PASSED
merge.sh: Merging in new chain 
certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3149: Merging ext_client  - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3150: Merging conflicting nicknames 1  - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3151: Merging conflicting nicknames 2  - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #4)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 45 (0x2d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:49 2012
            Not After : Mon Nov 27 23:55:49 2017
        Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain
             View,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:fd:27:e3:74:a9:b3:71:3a:51:b8:78:9e:f5:59:aa:
                    3d:d9:b6:c6:64:12:ae:04:69:bf:52:0e:73:4f:72:b6:
                    ba:1e:85:75:97:8d:ec:27:ac:a4:71:6a:0f:88:75:0a:
                    37:b8:cb:08:c7:ff:28:27:b1:f5:cf:6f:a4:2d:26:b1:
                    d2:5d:8b:1f:7a:1e:e9:3c:57:05:c1:5e:16:61:9c:60:
                    88:57:c2:5c:7f:bf:4d:b7:31:7f:21:a4:cf:f6:ea:da:
                    43:e9:ce:99:01:c4:89:be:02:34:45:38:00:db:1a:d0:
                    24:5c:26:62:06:06:9d:c8:8b:33:04:f6:eb:2d:d5:4d
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        2b:73:d3:5a:47:c3:36:55:a3:3e:50:11:76:0b:7a:93:
        13:ff:d3:b3:a4:59:07:35:7d:ea:4d:33:34:96:9c:bb:
        3e:88:2a:d7:fc:ec:e1:a3:8a:27:25:d7:07:31:70:56:
        9f:77:01:b8:f5:8d:0b:95:aa:97:bf:61:38:f2:15:62:
        24:3a:92:77:6e:47:8f:85:dc:c5:2a:3a:33:b4:16:2c:
        d7:29:54:3b:d8:2a:f3:31:14:a6:d0:4c:cf:0b:aa:11:
        c3:8f:46:15:a6:6f:da:02:1a:98:c4:18:b9:93:fa:70:
        e8:c8:6e:04:52:69:f9:e2:87:e1:77:aa:96:9f:0c:08
    Fingerprint (MD5):
        2A:C2:4C:91:7F:5E:7C:2B:88:66:DA:8F:20:7A:0F:B2
    Fingerprint (SHA1):
        6A:DC:C1:78:A4:DD:54:BC:A9:89:EA:3D:C6:3D:3D:6D:A4:96:0B:0D

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

merge.sh: #3152: Verify nicknames were deconflicted (Alice #4)  - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #100)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 46 (0x2e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:50 2012
            Not After : Mon Nov 27 23:55:50 2017
        Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain
             View,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f3:26:a9:78:57:e0:f8:fb:76:ac:fe:47:ab:a3:45:6c:
                    f9:24:03:c5:9c:c0:5e:3f:cb:cd:fd:b2:51:a4:06:65:
                    5d:60:39:01:20:fb:fd:77:6c:e4:13:1c:0a:3c:9c:c2:
                    d4:81:ad:8e:8f:00:35:0f:70:39:d0:6b:07:7f:b2:72:
                    4e:05:dc:73:ac:8c:be:68:f5:de:87:74:0e:52:14:41:
                    a0:46:e1:f4:a5:54:7d:b0:e2:ee:6c:cc:3b:d8:12:69:
                    39:c3:d0:48:52:90:d6:8d:e5:1f:56:5e:da:5e:d6:71:
                    c2:7b:a4:69:39:2e:01:9b:c6:50:2a:6d:03:c4:6b:23
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0b:d2:32:15:d7:17:f9:92:b9:c5:19:78:d1:83:5c:ba:
        31:64:8a:32:97:e1:73:f4:d4:d4:4b:0b:94:19:91:8c:
        dd:6e:e4:88:ec:16:90:f5:fc:13:84:7a:5a:3d:0c:df:
        66:8d:2a:87:3b:65:33:da:d6:44:7b:74:00:8e:41:3d:
        cb:b6:0b:df:51:f9:9b:0b:12:b8:cc:9d:b0:89:d7:06:
        43:8b:2d:23:0f:86:9a:e4:05:a0:f5:8b:95:96:de:79:
        55:dc:15:eb:69:6c:97:08:ce:52:7d:88:93:65:06:5f:
        13:fb:3a:85:36:21:8e:f2:f1:e7:c2:1c:59:7f:72:7e
    Fingerprint (MD5):
        8C:7E:14:D4:4A:A7:5A:8A:60:61:66:30:DD:08:69:88
    Fingerprint (SHA1):
        84:B4:E5:49:EC:D3:08:A3:BD:2B:D0:11:CF:E3:C0:24:80:90:C2:09

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

merge.sh: #3153: Verify nicknames were deconflicted (Alice #100)  - PASSED
merge.sh: Merging in SDR 
certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #3154: Merging SDR  - PASSED

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

Alice-ec                                                     u,u,u
Dave                                                         u,u,u
chain-2-clientCA-ec                                          ,,   
Alice #1                                                     ,,   
buildnss02.usersys.redhat.com-ecmixed                        ,,   
Alice #99                                                    ,,   
bob@bogus.com                                                ,,   
eve@bogus.com                                                ,,   
bob-ec@bogus.com                                             ,,   
buildnss02.usersys.redhat.com                                u,u,u
buildnss02.usersys.redhat.com-ec                             ,,   
buildnss02-sni.usersys.redhat.com-ecmixed                    ,,   
clientCA                                                     T,C,C
clientCA-ec                                                  T,C,C
Alice #3                                                     ,,   
TestCA                                                       CT,C,C
TestCA-ec                                                    CT,C,C
Alice-ecmixed                                                u,u,u
Dave-ecmixed                                                 ,,   
buildnss02-sni.usersys.redhat.com                            u,u,u
buildnss02-sni.usersys.redhat.com-ec                         ,,   
ExtendedSSLUser                                              u,u,u
serverCA                                                     C,C,C
ExtendedSSLUser-ec                                           ,,   
serverCA-ec                                                  C,C,C
chain-1-clientCA-ec                                          ,,   
chain-1-clientCA                                             ,,   
Alice #2                                                     ,,   
Alice #4                                                     ,,   
Alice                                                        u,u,u
Dave-ec                                                      ,,   
ExtendedSSLUser-ecmixed                                      ,,   
chain-2-clientCA                                             ,,   
Alice #100                                                   ,,   


CRL names                                CRL Type

TestCA                                   CRL  
TestCA-ec                                CRL  
merge.sh: Decrypt - With Original SDR Key
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests.v3.12297 -t Test2 -f ../tests.pw
merge.sh: #3155: Decrypt - Value 3  - PASSED
merge.sh: Decrypt - With Merged SDR Key
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests.v1.12297 -t Test1 -f ../tests.pw
merge.sh: #3156: Decrypt - Value 1  - PASSED
merge.sh: Signing with merged key  ------------------
cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig
merge.sh: #3157: Create Detached Signature Dave . - PASSED
cmsutil -D -i dave.dsig -c alice.txt -d . 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
merge.sh: #3158: Verifying Dave's Detached Signature  - PASSED
merge.sh: verifying  merged cert  ------------------
certutil -V -n ExtendedSSLUser -u C -d .
certutil: certificate is valid
merge.sh: #3159: Verifying ExtendedSSL User Cert  - PASSED
merge.sh: verifying  merged crl  ------------------
crlutil -L -n TestCA -d .
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US"
    This Update: Tue Nov 27 23:55:59 2012
    Entry 1 (0x1):
        Serial Number: 40 (0x28)
        Revocation Date: Tue Nov 27 23:55:14 2012
        Entry Extensions:
            Name: CRL reason code

    Entry 2 (0x2):
        Serial Number: 42 (0x2a)
        Revocation Date: Tue Nov 27 23:55:57 2012
    CRL Extensions:
        Name: Certificate Issuer Alt Name
        RFC822 Name: "caemail@ca.com"
        DNS name: "ca.com"
        Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo
            rnia,C=US"
        URI: "http://ca.com"
        IP Address:
            87:0b:31:39:32:2e:31:36:38:2e:30:2e:31

merge.sh: #3160: Verifying TestCA CRL  - PASSED
TIMESTAMP merge END: Tue Nov 27 19:06:47 EST 2012
Running tests for pkits
TIMESTAMP pkits BEGIN: Tue Nov 27 19:06:47 EST 2012
pkits.sh Start of logfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/pkits.log
HOSTDIR /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1
PKITSDIR /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits
PKITSdb /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb
PKITSbkp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSbkp
PKITS_DATA /home/tinderbox/pkits/data/
certs /home/tinderbox/pkits/data//certs
crls /home/tinderbox/pkits/data//crls

***************************************************************
NIST PKITS Section 4.1: Signature Verification
***************************************************************

--------------------------------------------------------------------
Test case Valid Signatures Test1

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidCertificatePathTest1EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is good!
pkits.sh: #3161: Valid Signatures Test1 - PASSED
pkits.sh SUCCESS: Valid Signatures Test1 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid CA Signature Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n BadSignedCACert -i /home/tinderbox/pkits/data//certs/BadSignedCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadSignedCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidCASignatureTest2EE.crt /home/tinderbox/pkits/data//certs/BadSignedCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. BadSignedCACert [Certificate Authority]:
  ERROR -8182: Peer's certificate has an invalid signature.
pkits.sh: #3162: Invalid CA Signature Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid CA Signature Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid EE Signature Test3

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidEESignatureTest3EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid EE Signature Test3,O=Test Certificates 2011,C=US :
  ERROR -8182: Peer's certificate has an invalid signature.
pkits.sh: #3163: Invalid EE Signature Test3 (2)  - PASSED
pkits.sh SUCCESS: Invalid EE Signature Test3 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DSA Signatures Test4

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n DSACACert -i /home/tinderbox/pkits/data//certs/DSACACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/DSACACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDSASignaturesTest4EE.crt /home/tinderbox/pkits/data//certs/DSACACert.crt
Chain is good!
pkits.sh: #3164: Valid DSA Signatures Test4 - PASSED
pkits.sh SUCCESS: Valid DSA Signatures Test4 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid DSA Parameter Inheritance Test5

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n DSACACert -i /home/tinderbox/pkits/data//certs/DSACACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/DSACACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n DSAParametersInheritedCACert -i /home/tinderbox/pkits/data//certs/DSAParametersInheritedCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/DSAParametersInheritedCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDSAParameterInheritanceTest5EE.crt /home/tinderbox/pkits/data//certs/DSAParametersInheritedCACert.crt /home/tinderbox/pkits/data//certs/DSACACert.crt
Chain is good!
pkits.sh: #3165: Valid DSA Parameter Inheritance Test5 - PASSED
pkits.sh SUCCESS: Valid DSA Parameter Inheritance Test5 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DSA Signature Test6

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n DSACACert -i /home/tinderbox/pkits/data//certs/DSACACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/DSACACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDSASignatureTest6EE.crt /home/tinderbox/pkits/data//certs/DSACACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid DSA Signature EE Certificate Test6,O=Test Certificates 2011,C=US :
  ERROR -8182: Peer's certificate has an invalid signature.
pkits.sh: #3166: Invalid DSA Signature Test6 (2)  - PASSED
pkits.sh SUCCESS: Invalid DSA Signature Test6 returned as expected 2
Restore DB

***************************************************************
NIST PKITS Section 4.2: Validity Periods
***************************************************************

--------------------------------------------------------------------
Test case Invalid CA notBefore Date Test1

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n BadnotBeforeDateCACert -i /home/tinderbox/pkits/data//certs/BadnotBeforeDateCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadnotBeforeDateCACRL.crl
crlutil: unable to import CRL: The CRL for the certificate's issuer has an invalid signature.
pkits.sh: #3167: Invalid CA notBefore Date Test1 (1)  - PASSED
pkits.sh SUCCESS: Invalid CA notBefore Date Test1 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Invalid EE notBefore Date Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidEEnotBeforeDateTest2EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid EE notBefore Date EE Certificate Test2,O=Test Certificates 2011,C=US :
  ERROR -8181: Peer's Certificate has expired.
pkits.sh: #3168: Invalid EE notBefore Date Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid EE notBefore Date Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid pre2000 UTC notBefore Date Test3

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/Validpre2000UTCnotBeforeDateTest3EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is good!
pkits.sh: #3169: Valid pre2000 UTC notBefore Date Test3 - PASSED
pkits.sh SUCCESS: Valid pre2000 UTC notBefore Date Test3 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid GeneralizedTime notBefore Date Test4

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidGeneralizedTimenotBeforeDateTest4EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is good!
pkits.sh: #3170: Valid GeneralizedTime notBefore Date Test4 - PASSED
pkits.sh SUCCESS: Valid GeneralizedTime notBefore Date Test4 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid CA notAfter Date Test5

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n BadnotAfterDateCACert -i /home/tinderbox/pkits/data//certs/BadnotAfterDateCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadnotAfterDateCACRL.crl
crlutil: unable to import CRL: The CRL for the certificate's issuer has an invalid signature.
pkits.sh: #3171: Invalid CA notAfter Date Test5 (1)  - PASSED
pkits.sh SUCCESS: Invalid CA notAfter Date Test5 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Invalid EE notAfter Date Test6

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidEEnotAfterDateTest6EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid EE notAfter Date EE Certificate Test6,O=Test Certificates 2011,C=US :
  ERROR -8181: Peer's Certificate has expired.
pkits.sh: #3172: Invalid EE notAfter Date Test6 (2)  - PASSED
pkits.sh SUCCESS: Invalid EE notAfter Date Test6 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid pre2000 UTC EE notAfter Date Test7

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/Invalidpre2000UTCEEnotAfterDateTest7EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid pre2000 UTC EE notAfter Date EE Certificate Test7,O=Test Certificates 2011,C=US :
  ERROR -8181: Peer's Certificate has expired.
pkits.sh: #3173: Invalid pre2000 UTC EE notAfter Date Test7 (2)  - PASSED
pkits.sh SUCCESS: Invalid pre2000 UTC EE notAfter Date Test7 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case ValidGeneralizedTime notAfter Date Test8

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidGeneralizedTimenotAfterDateTest8EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is good!
pkits.sh: #3174: ValidGeneralizedTime notAfter Date Test8 - PASSED
pkits.sh SUCCESS: ValidGeneralizedTime notAfter Date Test8 returned as expected 0
Restore DB

***************************************************************
NIST PKITS Section 4.3: Verifying NameChaining
***************************************************************

--------------------------------------------------------------------
Test case Invalid Name Chaining EE Test1

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidNameChainingTest1EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Name Chaining EE Certificate Test1,O=Test Certificates 2011,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Good CA Root,O=Test Certificates 2011,C=US
pkits.sh: #3175: Invalid Name Chaining EE Test1 (2)  - PASSED
pkits.sh SUCCESS: Invalid Name Chaining EE Test1 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid Name Chaining Order Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n NameOrderingCACert -i /home/tinderbox/pkits/data//certs/NameOrderingCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/NameOrderCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidNameChainingOrderTest2EE.crt /home/tinderbox/pkits/data//certs/NameOrderingCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Name Chaining Order EE Certificate Test2,O=Test Certificates 2011,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Name Ordering CA,OU=Organizational Unit Name 1,OU=Organizational Unit Name 2,O=Test Certificates 2011,C=US
pkits.sh: #3176: Invalid Name Chaining Order Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid Name Chaining Order Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid Name Chaining UIDs Test6

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n UIDCACert -i /home/tinderbox/pkits/data//certs/UIDCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UIDCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidNameUIDsTest6EE.crt /home/tinderbox/pkits/data//certs/UIDCACert.crt
Chain is good!
pkits.sh: #3177: Valid Name Chaining UIDs Test6 - PASSED
pkits.sh SUCCESS: Valid Name Chaining UIDs Test6 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid RFC3280 Mandatory Attribute Types Test7

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n RFC3280MandatoryAttributeTypesCACert -i /home/tinderbox/pkits/data//certs/RFC3280MandatoryAttributeTypesCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/RFC3280MandatoryAttributeTypesCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC3280MandatoryAttributeTypesTest7EE.crt /home/tinderbox/pkits/data//certs/RFC3280MandatoryAttributeTypesCACert.crt
Chain is good!
pkits.sh: #3178: Valid RFC3280 Mandatory Attribute Types Test7 - PASSED
pkits.sh SUCCESS: Valid RFC3280 Mandatory Attribute Types Test7 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid RFC3280 Optional Attribute Types Test8

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n RFC3280OptionalAttributeTypesCACert -i /home/tinderbox/pkits/data//certs/RFC3280OptionalAttributeTypesCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/RFC3280OptionalAttributeTypesCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC3280OptionalAttributeTypesTest8EE.crt /home/tinderbox/pkits/data//certs/RFC3280OptionalAttributeTypesCACert.crt
Chain is good!
pkits.sh: #3179: Valid RFC3280 Optional Attribute Types Test8 - PASSED
pkits.sh SUCCESS: Valid RFC3280 Optional Attribute Types Test8 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid UTF8String Encoded Names Test9

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n UTF8StringEncodedNamesCACert -i /home/tinderbox/pkits/data//certs/UTF8StringEncodedNamesCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UTF8StringEncodedNamesCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidUTF8StringEncodedNamesTest9EE.crt /home/tinderbox/pkits/data//certs/UTF8StringEncodedNamesCACert.crt
Chain is good!
pkits.sh: #3180: Valid UTF8String Encoded Names Test9 - PASSED
pkits.sh SUCCESS: Valid UTF8String Encoded Names Test9 returned as expected 0
Restore DB

***************************************************************
NIST PKITS Section 4.4: Basic Certificate Revocation Tests
***************************************************************

--------------------------------------------------------------------
Test case Invalid Revoked CA Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n RevokedsubCACert -i /home/tinderbox/pkits/data//certs/RevokedsubCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/RevokedsubCACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRevokedCATest2EE.crt /home/tinderbox/pkits/data//certs/RevokedsubCACert.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. RevokedsubCACert [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
pkits.sh: #3181: Invalid Revoked CA Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid Revoked CA Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid Revoked EE Test3

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRevokedEETest3EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Revoked EE Certificate Test3,O=Test Certificates 2011,C=US :
  ERROR -8180: Peer's Certificate has been revoked.
pkits.sh: #3182: Invalid Revoked EE Test3 (2)  - PASSED
pkits.sh SUCCESS: Invalid Revoked EE Test3 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid Bad CRL Signature Test4

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n BadCRLSignatureCACert -i /home/tinderbox/pkits/data//certs/BadCRLSignatureCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadCRLSignatureCACRL.crl
crlutil: unable to import CRL: The CRL for the certificate's issuer has an invalid signature.
pkits.sh: #3183: Invalid Bad CRL Signature Test4 (1)  - PASSED
pkits.sh SUCCESS: Invalid Bad CRL Signature Test4 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Invalid Bad CRL Issuer Name Test5

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n BadCRLIssuerNameCACert -i /home/tinderbox/pkits/data//certs/BadCRLIssuerNameCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadCRLIssuerNameCACRL.crl
crlutil: unable to import CRL: Peer's Certificate issuer is not recognized.
pkits.sh: #3184: Invalid Bad CRL Issuer Name Test5 (1)  - PASSED
pkits.sh SUCCESS: Invalid Bad CRL Issuer Name Test5 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Valid Two CRLs Test7

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n TwoCRLsCACert -i /home/tinderbox/pkits/data//certs/TwoCRLsCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/TwoCRLsCAGoodCRL.crl
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/TwoCRLsCABadCRL.crl
crlutil: unable to import CRL: Peer's Certificate issuer is not recognized.
pkits.sh: #3185: Valid Two CRLs Test7 (1)  - PASSED
pkits.sh SUCCESS: Valid Two CRLs Test7 returned as expected 1
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidTwoCRLsTest7EE.crt /home/tinderbox/pkits/data//certs/TwoCRLsCACert.crt
Chain is good!
pkits.sh: #3186: Valid Two CRLs Test7 - PASSED
pkits.sh SUCCESS: Valid Two CRLs Test7 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid Unknown CRL Entry Extension Test8

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n UnknownCRLEntryExtensionCACert -i /home/tinderbox/pkits/data//certs/UnknownCRLEntryExtensionCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UnknownCRLEntryExtensionCACRL.crl
crlutil: unable to import CRL: Issuer's V2 Certificate Revocation List has an unknown critical extension.
pkits.sh: #3187: Invalid Unknown CRL Entry Extension Test8 (1)  - PASSED
pkits.sh SUCCESS: Invalid Unknown CRL Entry Extension Test8 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Invalid Unknown CRL Extension Test9

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n UnknownCRLExtensionCACert -i /home/tinderbox/pkits/data//certs/UnknownCRLExtensionCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UnknownCRLExtensionCACRL.crl
crlutil: unable to import CRL: Issuer's V2 Certificate Revocation List has an unknown critical extension.
pkits.sh: #3188: Invalid Unknown CRL Extension Test9 (1)  - PASSED
pkits.sh SUCCESS: Invalid Unknown CRL Extension Test9 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Invalid Unknown CRL Extension Test10

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n UnknownCRLExtensionCACert -i /home/tinderbox/pkits/data//certs/UnknownCRLExtensionCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UnknownCRLExtensionCACRL.crl
crlutil: unable to import CRL: Issuer's V2 Certificate Revocation List has an unknown critical extension.
pkits.sh: #3189: Invalid Unknown CRL Extension Test10 (1)  - PASSED
pkits.sh SUCCESS: Invalid Unknown CRL Extension Test10 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Valid GeneralizedTime CRL nextUpdate Test13

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n GeneralizedTimeCRLnextUpdateCACert -i /home/tinderbox/pkits/data//certs/GeneralizedTimeCRLnextUpdateCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GeneralizedTimeCRLnextUpdateCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidGeneralizedTimeCRLnextUpdateTest13EE.crt /home/tinderbox/pkits/data//certs/GeneralizedTimeCRLnextUpdateCACert.crt
Chain is good!
pkits.sh: #3190: Valid GeneralizedTime CRL nextUpdate Test13 - PASSED
pkits.sh SUCCESS: Valid GeneralizedTime CRL nextUpdate Test13 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid Negative Serial Number Test14

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n NegativeSerialNumberCACert -i /home/tinderbox/pkits/data//certs/NegativeSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/NegativeSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidNegativeSerialNumberTest14EE.crt /home/tinderbox/pkits/data//certs/NegativeSerialNumberCACert.crt
Chain is good!
pkits.sh: #3191: Valid Negative Serial Number Test14 - PASSED
pkits.sh SUCCESS: Valid Negative Serial Number Test14 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid Negative Serial Number Test15

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n NegativeSerialNumberCACert -i /home/tinderbox/pkits/data//certs/NegativeSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/NegativeSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidNegativeSerialNumberTest15EE.crt /home/tinderbox/pkits/data//certs/NegativeSerialNumberCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Negative Serial Number EE Certificate Test15,O=Test Certificates 2011,C=US :
  ERROR -8180: Peer's Certificate has been revoked.
pkits.sh: #3192: Invalid Negative Serial Number Test15 (2)  - PASSED
pkits.sh SUCCESS: Invalid Negative Serial Number Test15 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid Long Serial Number Test16

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n LongSerialNumberCACert -i /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/LongSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidLongSerialNumberTest16EE.crt /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
Chain is good!
pkits.sh: #3193: Valid Long Serial Number Test16 - PASSED
pkits.sh SUCCESS: Valid Long Serial Number Test16 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid Long Serial Number Test17

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n LongSerialNumberCACert -i /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/LongSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidLongSerialNumberTest17EE.crt /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
Chain is good!
pkits.sh: #3194: Valid Long Serial Number Test17 - PASSED
pkits.sh SUCCESS: Valid Long Serial Number Test17 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid Long Serial Number Test18

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n LongSerialNumberCACert -i /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/LongSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidLongSerialNumberTest18EE.crt /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Long Serial Number EE Certificate Test18,O=Test Certificates 2011,C=US :
  ERROR -8180: Peer's Certificate has been revoked.
pkits.sh: #3195: Invalid Long Serial Number Test18 (2)  - PASSED
pkits.sh SUCCESS: Invalid Long Serial Number Test18 returned as expected 2
Restore DB

***************************************************************
NIST PKITS Section 4.5: Self-Issued Certificates
***************************************************************

***************************************************************
NIST PKITS Section 4.6: Verifying Basic Constraints
***************************************************************

--------------------------------------------------------------------
Test case Invalid Missing basicConstraints Test1

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n MissingbasicConstraintsCACert -i /home/tinderbox/pkits/data//certs/MissingbasicConstraintsCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/MissingbasicConstraintsCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidMissingbasicConstraintsTest1EE.crt /home/tinderbox/pkits/data//certs/MissingbasicConstraintsCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Missing basicConstraints EE Certificate Test1,O=Test Certificates 2011,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Missing basicConstraints CA,O=Test Certificates 2011,C=US
pkits.sh: #3196: Invalid Missing basicConstraints Test1 (2)  - PASSED
pkits.sh SUCCESS: Invalid Missing basicConstraints Test1 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid cA False Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n basicConstraintsCriticalcAFalseCACert -i /home/tinderbox/pkits/data//certs/basicConstraintsCriticalcAFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/basicConstraintsCriticalcAFalseCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidcAFalseTest2EE.crt /home/tinderbox/pkits/data//certs/basicConstraintsCriticalcAFalseCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid cA False EE Certificate Test2,O=Test Certificates 2011,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=basicConstraints Critical cA False CA,O=Test Certificates 2011,C=US
pkits.sh: #3197: Invalid cA False Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid cA False Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid cA False Test3

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n basicConstraintsNotCriticalcAFalseCACert -i /home/tinderbox/pkits/data//certs/basicConstraintsNotCriticalcAFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/basicConstraintsNotCriticalcAFalseCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidcAFalseTest3EE.crt /home/tinderbox/pkits/data//certs/basicConstraintsNotCriticalcAFalseCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid cA False EE Certificate Test3,O=Test Certificates 2011,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=basicConstraints Not Critical cA False CA,O=Test Certificates 2011,C=US
pkits.sh: #3198: Invalid cA False Test3 (2)  - PASSED
pkits.sh SUCCESS: Invalid cA False Test3 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid basicConstraints Not Critical Test4

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n basicConstraintsNotCriticalCACert -i /home/tinderbox/pkits/data//certs/basicConstraintsNotCriticalCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/basicConstraintsNotCriticalCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidbasicConstraintsNotCriticalTest4EE.crt /home/tinderbox/pkits/data//certs/basicConstraintsNotCriticalCACert.crt
Chain is good!
pkits.sh: #3199: Valid basicConstraints Not Critical Test4 - PASSED
pkits.sh SUCCESS: Valid basicConstraints Not Critical Test4 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test5

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint0subCACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0subCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0subCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest5EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0subCACert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. pathLenConstraint0CACert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #3200: Invalid pathLenConstraint Test5 (2)  - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test5 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test6

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint0subCACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0subCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0subCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest6EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0subCACert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. pathLenConstraint0CACert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #3201: Invalid pathLenConstraint Test6 (2)  - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test6 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid pathLenConstraint Test7

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidpathLenConstraintTest7EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is good!
pkits.sh: #3202: Valid pathLenConstraint Test7 - PASSED
pkits.sh SUCCESS: Valid pathLenConstraint Test7 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid pathLenConstraint test8

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidpathLenConstraintTest8EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is good!
pkits.sh: #3203: Valid pathLenConstraint test8 - PASSED
pkits.sh SUCCESS: Valid pathLenConstraint test8 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test9

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA0Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA0Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA0CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA00Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA00Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA00CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest9EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA00Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA0Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. pathLenConstraint6subCA0Cert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #3204: Invalid pathLenConstraint Test9 (2)  - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test9 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test10

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA0Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA0Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA0CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA00Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA00Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA00CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest10EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA00Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA0Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. pathLenConstraint6subCA0Cert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #3205: Invalid pathLenConstraint Test10 (2)  - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test10 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test11

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA1Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA1CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA11Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA11Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA11CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubsubCA11XCert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA11XCert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubsubCA11XCRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest11EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA11XCert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA11Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA1Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. pathLenConstraint6subCA1Cert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #3206: Invalid pathLenConstraint Test11 (2)  - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test11 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid pathLenConstraint test12

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA1Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA1CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA11Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA11Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA11CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubsubCA11XCert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA11XCert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubsubCA11XCRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest12EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA11XCert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA11Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA1Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. pathLenConstraint6subCA1Cert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #3207: Invalid pathLenConstraint test12 (2)  - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint test12 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid pathLenConstraint Test13

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA4Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA4Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA4CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA41Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA41Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA41CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubsubCA41XCert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA41XCert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubsubCA41XCRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidpathLenConstraintTest13EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA41XCert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA41Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA4Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is good!
pkits.sh: #3208: Valid pathLenConstraint Test13 - PASSED
pkits.sh SUCCESS: Valid pathLenConstraint Test13 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid pathLenConstraint Test14

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA4Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA4Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA4CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA41Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA41Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA41CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubsubCA41XCert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA41XCert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubsubCA41XCRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidpathLenConstraintTest14EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA41XCert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA41Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA4Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is good!
pkits.sh: #3209: Valid pathLenConstraint Test14 - PASSED
pkits.sh SUCCESS: Valid pathLenConstraint Test14 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid Self-Issued pathLenConstraint Test16

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n pathLenConstraint0subCA2Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidSelfIssuedpathLenConstraintTest16EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0subCA2Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0SelfIssuedCACert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. pathLenConstraint0CACert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #3210: Invalid Self-Issued pathLenConstraint Test16 (2)  - PASSED
pkits.sh SUCCESS: Invalid Self-Issued pathLenConstraint Test16 returned as expected 2
Restore DB

***************************************************************
NIST PKITS Section 4.7: Key Usage
***************************************************************

--------------------------------------------------------------------
Test case Invalid keyUsage Critical keyCertSign False Test1

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n keyUsageCriticalkeyCertSignFalseCACert -i /home/tinderbox/pkits/data//certs/keyUsageCriticalkeyCertSignFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageCriticalkeyCertSignFalseCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidkeyUsageCriticalkeyCertSignFalseTest1EE.crt /home/tinderbox/pkits/data//certs/keyUsageCriticalkeyCertSignFalseCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. keyUsageCriticalkeyCertSignFalseCACert [Certificate Authority]:
  ERROR -8102: Certificate key usage inadequate for attempted operation.
    CN=Trust Anchor,O=Test Certificates 2011,C=US
pkits.sh: #3211: Invalid keyUsage Critical keyCertSign False Test1 (2)  - PASSED
pkits.sh SUCCESS: Invalid keyUsage Critical keyCertSign False Test1 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid keyUsage Not Critical keyCertSign False Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n keyUsageNotCriticalkeyCertSignFalseCACert -i /home/tinderbox/pkits/data//certs/keyUsageNotCriticalkeyCertSignFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageNotCriticalkeyCertSignFalseCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE.crt /home/tinderbox/pkits/data//certs/keyUsageNotCriticalkeyCertSignFalseCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. keyUsageNotCriticalkeyCertSignFalseCACert [Certificate Authority]:
  ERROR -8102: Certificate key usage inadequate for attempted operation.
    CN=Trust Anchor,O=Test Certificates 2011,C=US
pkits.sh: #3212: Invalid keyUsage Not Critical keyCertSign False Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid keyUsage Not Critical keyCertSign False Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid keyUsage Not Critical Test3

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n keyUsageNotCriticalCACert -i /home/tinderbox/pkits/data//certs/keyUsageNotCriticalCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageNotCriticalCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidkeyUsageNotCriticalTest3EE.crt /home/tinderbox/pkits/data//certs/keyUsageNotCriticalCACert.crt
Chain is good!
pkits.sh: #3213: Valid keyUsage Not Critical Test3 - PASSED
pkits.sh SUCCESS: Valid keyUsage Not Critical Test3 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid keyUsage Critical cRLSign False Test4

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n keyUsageCriticalcRLSignFalseCACert -i /home/tinderbox/pkits/data//certs/keyUsageCriticalcRLSignFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageCriticalcRLSignFalseCACRL.crl
crlutil: unable to import CRL: Certificate usages field is invalid.
pkits.sh: #3214: Invalid keyUsage Critical cRLSign False Test4 (1)  - PASSED
pkits.sh SUCCESS: Invalid keyUsage Critical cRLSign False Test4 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Invalid keyUsage Not Critical cRLSign False Test5

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n keyUsageNotCriticalcRLSignFalseCACert -i /home/tinderbox/pkits/data//certs/keyUsageNotCriticalcRLSignFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageNotCriticalcRLSignFalseCACRL.crl
crlutil: unable to import CRL: Certificate usages field is invalid.
pkits.sh: #3215: Invalid keyUsage Not Critical cRLSign False Test5 (1)  - PASSED
pkits.sh SUCCESS: Invalid keyUsage Not Critical cRLSign False Test5 returned as expected 1
Restore DB

***************************************************************
NIST PKITS Section 4.13: Name Constraints
***************************************************************

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test1

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest1EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is good!
pkits.sh: #3216: Valid DN nameConstraints Test1 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test1 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest2EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test2,OU=excludedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3217: Invalid DN nameConstraints Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test3

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest3EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test3,OU=permittedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3218: Invalid DN nameConstraints Test3 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test3 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test4

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest4EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is good!
pkits.sh: #3219: Valid DN nameConstraints Test4 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test4 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test5

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest5EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN2CACert.crt
Chain is good!
pkits.sh: #3220: Valid DN nameConstraints Test5 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test5 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test6

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest6EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is good!
pkits.sh: #3221: Valid DN nameConstraints Test6 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test6 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test7

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest7EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test7,OU=excludedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3222: Invalid DN nameConstraints Test7 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test7 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test8

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN4CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN4CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN4CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest8EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN4CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test8,OU=excludedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3223: Invalid DN nameConstraints Test8 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test8 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test9

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN4CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN4CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN4CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest9EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN4CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test9,OU=excludedSubtree2,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3224: Invalid DN nameConstraints Test9 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test9 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test10

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN5CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN5CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN5CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest10EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN5CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test10,OU=excludedSubtree1,OU=permittedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3225: Invalid DN nameConstraints Test10 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test10 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test11

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN5CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN5CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN5CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest11EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN5CACert.crt
Chain is good!
pkits.sh: #3226: Valid DN nameConstraints Test11 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test11 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test12

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest12EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA1Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test12,OU=permittedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3227: Invalid DN nameConstraints Test12 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test12 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test13

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest13EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA2Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test13,OU=permittedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3228: Invalid DN nameConstraints Test13 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test13 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test14

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest14EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA2Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is good!
pkits.sh: #3229: Valid DN nameConstraints Test14 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test14 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test15

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3subCA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3subCA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest15EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA1Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Invalid DN nameConstraints EE Certificate Test15,OU=excludedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3230: Invalid DN nameConstraints Test15 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test15 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test16

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3subCA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3subCA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest16EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA1Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DN nameConstraints EE Certificate Test16,OU=excludedSubtree2,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3231: Invalid DN nameConstraints Test16 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test16 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test17

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3subCA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest17EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA2Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Invalid DN nameConstraints EE Certificate Test17,OU=excludedSubtree1,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3232: Invalid DN nameConstraints Test17 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test17 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test18

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3subCA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest18EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA2Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is good!
pkits.sh: #3233: Valid DN nameConstraints Test18 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test18 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid Self-Issued DN nameConstraints Test20

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest20EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=nameConstraints DN1 CA,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3234: Invalid Self-Issued DN nameConstraints Test20 (2)  - PASSED
pkits.sh SUCCESS: Invalid Self-Issued DN nameConstraints Test20 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid RFC822 nameConstraints Test21

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC822nameConstraintsTest21EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA1Cert.crt
Chain is good!
pkits.sh: #3235: Valid RFC822 nameConstraints Test21 - PASSED
pkits.sh SUCCESS: Valid RFC822 nameConstraints Test21 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid RFC822 nameConstraints Test22

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRFC822nameConstraintsTest22EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA1Cert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. test22ee@testcertificates.gov [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3236: Invalid RFC822 nameConstraints Test22 (2)  - PASSED
pkits.sh SUCCESS: Invalid RFC822 nameConstraints Test22 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid RFC822 nameConstraints Test23

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC822nameConstraintsTest23EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA2Cert.crt
Chain is good!
pkits.sh: #3237: Valid RFC822 nameConstraints Test23 - PASSED
pkits.sh SUCCESS: Valid RFC822 nameConstraints Test23 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid RFC822 nameConstraints Test24

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRFC822nameConstraintsTest24EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA2Cert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. test24ee@mailserver.testcertificates.gov [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3238: Invalid RFC822 nameConstraints Test24 (2)  - PASSED
pkits.sh SUCCESS: Invalid RFC822 nameConstraints Test24 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid RFC822 nameConstraints Test25

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC822nameConstraintsTest25EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA3Cert.crt
Chain is good!
pkits.sh: #3239: Valid RFC822 nameConstraints Test25 - PASSED
pkits.sh SUCCESS: Valid RFC822 nameConstraints Test25 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid RFC822 nameConstraints Test26

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRFC822nameConstraintsTest26EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA3Cert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. test26ee@testcertificates.gov [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3240: Invalid RFC822 nameConstraints Test26 (2)  - PASSED
pkits.sh SUCCESS: Invalid RFC822 nameConstraints Test26 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DN and RFC822 nameConstraints Test27

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNandRFC822nameConstraintsTest27EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is good!
pkits.sh: #3241: Valid DN and RFC822 nameConstraints Test27 - PASSED
pkits.sh SUCCESS: Valid DN and RFC822 nameConstraints Test27 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DN and RFC822 nameConstraints Test28

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNandRFC822nameConstraintsTest28EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. test28ee@invalidcertificates.gov [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3242: Invalid DN and RFC822 nameConstraints Test28 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN and RFC822 nameConstraints Test28 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN and RFC822 nameConstraints Test29

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNandRFC822nameConstraintsTest29EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. test29ee@invalidcertificates.gov [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3243: Invalid DN and RFC822 nameConstraints Test29 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN and RFC822 nameConstraints Test29 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DNS nameConstraints Test30

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNSnameConstraintsTest30EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
Chain is good!
pkits.sh: #3244: Valid DNS nameConstraints Test30 - PASSED
pkits.sh SUCCESS: Valid DNS nameConstraints Test30 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DNS nameConstraints Test31

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNSnameConstraintsTest31EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DNS nameConstraints EE Certificate Test31,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3245: Invalid DNS nameConstraints Test31 (2)  - PASSED
pkits.sh SUCCESS: Invalid DNS nameConstraints Test31 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DNS nameConstraints Test32

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNSnameConstraintsTest32EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS2CACert.crt
Chain is good!
pkits.sh: #3246: Valid DNS nameConstraints Test32 - PASSED
pkits.sh SUCCESS: Valid DNS nameConstraints Test32 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DNS nameConstraints Test33

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNSnameConstraintsTest33EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS2CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DNS nameConstraints EE Certificate Test33,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3247: Invalid DNS nameConstraints Test33 (2)  - PASSED
pkits.sh SUCCESS: Invalid DNS nameConstraints Test33 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid URI nameConstraints Test34

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsURI1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsURI1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsURI1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidURInameConstraintsTest34EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsURI1CACert.crt
Chain is good!
pkits.sh: #3248: Valid URI nameConstraints Test34 - PASSED
pkits.sh SUCCESS: Valid URI nameConstraints Test34 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid URI nameConstraints Test35

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsURI1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsURI1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsURI1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidURInameConstraintsTest35EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsURI1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid URI nameConstraints EE Certificate Test35,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3249: Invalid URI nameConstraints Test35 (2)  - PASSED
pkits.sh SUCCESS: Invalid URI nameConstraints Test35 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid URI nameConstraints Test36

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsURI2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsURI2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsURI2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidURInameConstraintsTest36EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsURI2CACert.crt
Chain is good!
pkits.sh: #3250: Valid URI nameConstraints Test36 - PASSED
pkits.sh SUCCESS: Valid URI nameConstraints Test36 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid URI nameConstraints Test37

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsURI2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsURI2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsURI2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidURInameConstraintsTest37EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsURI2CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid URI nameConstraints EE Certificate Test37,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3251: Invalid URI nameConstraints Test37 (2)  - PASSED
pkits.sh SUCCESS: Invalid URI nameConstraints Test37 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DNS nameConstraints Test38

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNSnameConstraintsTest38EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=Invalid DNS nameConstraints EE Certificate Test38,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name.
pkits.sh: #3252: Invalid DNS nameConstraints Test38 (2)  - PASSED
pkits.sh SUCCESS: Invalid DNS nameConstraints Test38 returned as expected 2
Restore DB

***************************************************************
NIST PKITS Section 4.16: Private Certificate Extensions
***************************************************************

--------------------------------------------------------------------
Test case Valid Unknown Not Critical Certificate Extension Test1

vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidUnknownNotCriticalCertificateExtensionTest1EE.crt
Chain is good!
pkits.sh: #3253: Valid Unknown Not Critical Certificate Extension Test1 - PASSED
pkits.sh SUCCESS: Valid Unknown Not Critical Certificate Extension Test1 returned as expected 0

--------------------------------------------------------------------
Test case Invalid Unknown Critical Certificate Extension Test2

vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidUnknownCriticalCertificateExtensionTest2EE.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Unknown Critical Certificate Extension EE Cert Test2,O=Test Certificates 2011,C=US :
  ERROR -8151: Certificate contains unknown critical extension.
pkits.sh: #3254: Invalid Unknown Critical Certificate Extension Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid Unknown Critical Certificate Extension Test2 returned as expected 2
TIMESTAMP pkits END: Tue Nov 27 19:06:55 EST 2012
Running tests for chains
TIMESTAMP chains BEGIN: Tue Nov 27 19:06:55 EST 2012
~/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/aiahttp ~/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/chains
httpserv starting at Tue Nov 27 19:06:55 EST 2012
httpserv -D -p 8553  \
         -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/aiahttp/http_pid.12297  &
trying to connect to httpserv at Tue Nov 27 19:06:55 EST 2012
tstclnt -p 8553 -h buildnss02.usersys.redhat.com -q -v
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to httpserv at Tue Nov 27 19:07:00 EST 2012
tstclnt -p 8553 -h buildnss02.usersys.redhat.com -q -v
tstclnt: error looking up host: A directory lookup on a network address has failed
chains.sh: #3255: Waiting for Server - FAILED
kill -0 29344 >/dev/null 2>/dev/null
httpserv with PID 29344 found at Tue Nov 27 19:07:00 EST 2012
httpserv with PID 29344 started at Tue Nov 27 19:07:00 EST 2012
~/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/chains
chains.sh: Certificate Chains Tests ===============================
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #3256: Bridge: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190656 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3257: Bridge: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #3258: Bridge: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #3259: Bridge: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190657 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3260: Bridge: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #3261: Bridge: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #3262: Bridge: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o BridgeReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3263: Bridge: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1127190658 -7 Bridge@Army  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3264: Bridge: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #3265: Bridge: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1127190659 -7 Bridge@Navy  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3266: Bridge: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #3267: Bridge: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #3268: Bridge: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #3269: Bridge: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3270: Bridge: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserBridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1127190660   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3271: Bridge: Creating certficate UserBridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate UserBridge.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der
chains.sh: #3272: Bridge: Importing certificate UserBridge.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3273: Bridge: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Army.der to AllDB database
certutil -A -n Army  -t "" -d AllDB -f AllDB/dbpasswd -i Army.der
chains.sh: #3274: Bridge: Importing certificate Army.der to AllDB database  - PASSED
chains.sh: Importing certificate Navy.der to AllDB database
certutil -A -n Navy  -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der
chains.sh: #3275: Bridge: Importing certificate Navy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Navy
vfychain -d AllDB -pp -vv      UserBridge.der BridgeNavy.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190657 (0x432f9081)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:01 2012
            Not After : Tue Nov 28 00:07:01 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:42:b1:e1:be:ce:0d:72:0e:c1:9d:ed:e5:55:b7:02:
                    20:f2:33:51:cd:94:3a:bc:58:92:69:1a:94:67:b8:a6:
                    da:13:fe:ec:44:92:4e:af:38:68:43:f8:45:24:03:3e:
                    1b:e8:a2:df:00:16:4f:0c:d4:b7:9a:97:07:23:cc:70:
                    5d:30:65:3d:27:86:51:a2:6a:a9:d9:88:bc:2d:6c:e9:
                    1a:0a:ea:cd:9a:47:28:9b:ef:2a:bb:25:b8:a5:d7:2e:
                    bd:8d:a9:c8:3a:b6:1d:3d:7f:f7:56:29:03:09:cf:2c:
                    a9:ce:90:ea:0f:41:a9:87:d1:82:26:b9:f3:2d:67:cf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        45:17:4c:f1:3f:1a:57:05:fd:07:d1:f2:67:b8:ed:51:
        2c:48:0d:3c:d1:23:c8:a5:24:0a:c5:53:3a:e0:12:10:
        f4:5b:0f:cd:57:ec:85:03:97:ce:0d:73:20:ed:62:d0:
        5e:a2:d2:55:71:7d:51:9d:5d:e4:5e:cd:a8:e6:45:be:
        70:87:04:bb:ff:ef:0d:c3:3e:a8:7e:00:01:96:63:c6:
        bd:9f:51:0e:c2:08:80:45:e8:27:88:d3:e7:32:9d:c9:
        e4:b8:e7:b4:90:17:bc:39:6f:4c:dc:a9:e5:4a:3d:d7:
        3b:84:39:4c:42:f7:ba:f2:d7:80:71:3b:08:fb:3c:28
    Fingerprint (MD5):
        B4:4F:D3:28:A1:10:F8:8C:A1:6C:FC:BB:0C:D1:EE:EB
    Fingerprint (SHA1):
        88:4A:92:15:24:F3:66:90:51:BB:00:9C:35:A5:D0:87:46:97:F8:BC

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3276: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Navy - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der BridgeArmy.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190656 (0x432f9080)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:01 2012
            Not After : Tue Nov 28 00:07:01 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f1:4d:72:3f:6d:aa:2a:b7:bb:a7:35:55:af:2f:f6:62:
                    43:99:c0:3e:93:39:82:c9:6c:2f:ea:1a:bb:20:6b:f5:
                    44:6e:4a:dd:50:c2:3e:9e:6b:aa:f9:a3:47:45:e8:81:
                    83:3b:6f:27:45:ec:4b:93:13:cb:74:11:52:ea:0a:54:
                    e3:dd:70:c9:2e:14:1e:9a:1b:d6:66:d0:20:69:53:4d:
                    20:0f:3c:82:c9:60:a8:2d:b2:74:6f:9a:93:44:d5:58:
                    06:48:f4:f2:11:f6:4e:0b:b8:03:ce:dd:27:7f:12:8a:
                    96:bd:1a:89:05:52:c9:aa:2d:ea:60:8d:04:39:80:cb
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        bb:44:e4:bd:a6:64:cf:05:bc:04:dc:a1:f9:3f:82:cc:
        2d:ea:f5:b5:eb:cd:a1:25:bd:ea:92:3f:75:2f:8a:a9:
        f0:22:46:dc:25:6c:41:f7:8d:e3:de:d8:b0:45:d6:c3:
        d0:57:7e:76:de:81:90:4b:c6:64:f0:b6:00:a7:ac:ca:
        3f:7e:7c:7a:44:a3:f0:6a:81:94:6c:d2:e7:81:b6:b7:
        a6:73:4c:3c:67:a9:ad:c1:36:4a:7b:a6:ce:80:e0:e1:
        e6:05:00:75:53:e4:a5:d4:92:2a:58:94:86:b2:d7:6f:
        80:a6:e6:86:2f:44:c2:0f:c0:32:9d:4c:bd:e2:c8:bd
    Fingerprint (MD5):
        FC:3D:58:EA:E0:3E:78:B0:AA:32:83:BA:5F:7C:7A:99
    Fingerprint (SHA1):
        2A:94:8E:3A:A7:E0:77:F9:7B:A9:78:C0:22:A8:D7:EE:3D:B3:4C:8F

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3277: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der BridgeNavy.der  -t Army
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Navy [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #3278: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Importing certificate BridgeArmy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der
chains.sh: #3279: Bridge: Importing certificate BridgeArmy.der to AllDB database  - PASSED
chains.sh: Importing certificate BridgeNavy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der
chains.sh: #3280: Bridge: Importing certificate BridgeNavy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der  -t Army
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190656 (0x432f9080)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:01 2012
            Not After : Tue Nov 28 00:07:01 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f1:4d:72:3f:6d:aa:2a:b7:bb:a7:35:55:af:2f:f6:62:
                    43:99:c0:3e:93:39:82:c9:6c:2f:ea:1a:bb:20:6b:f5:
                    44:6e:4a:dd:50:c2:3e:9e:6b:aa:f9:a3:47:45:e8:81:
                    83:3b:6f:27:45:ec:4b:93:13:cb:74:11:52:ea:0a:54:
                    e3:dd:70:c9:2e:14:1e:9a:1b:d6:66:d0:20:69:53:4d:
                    20:0f:3c:82:c9:60:a8:2d:b2:74:6f:9a:93:44:d5:58:
                    06:48:f4:f2:11:f6:4e:0b:b8:03:ce:dd:27:7f:12:8a:
                    96:bd:1a:89:05:52:c9:aa:2d:ea:60:8d:04:39:80:cb
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        bb:44:e4:bd:a6:64:cf:05:bc:04:dc:a1:f9:3f:82:cc:
        2d:ea:f5:b5:eb:cd:a1:25:bd:ea:92:3f:75:2f:8a:a9:
        f0:22:46:dc:25:6c:41:f7:8d:e3:de:d8:b0:45:d6:c3:
        d0:57:7e:76:de:81:90:4b:c6:64:f0:b6:00:a7:ac:ca:
        3f:7e:7c:7a:44:a3:f0:6a:81:94:6c:d2:e7:81:b6:b7:
        a6:73:4c:3c:67:a9:ad:c1:36:4a:7b:a6:ce:80:e0:e1:
        e6:05:00:75:53:e4:a5:d4:92:2a:58:94:86:b2:d7:6f:
        80:a6:e6:86:2f:44:c2:0f:c0:32:9d:4c:bd:e2:c8:bd
    Fingerprint (MD5):
        FC:3D:58:EA:E0:3E:78:B0:AA:32:83:BA:5F:7C:7A:99
    Fingerprint (SHA1):
        2A:94:8E:3A:A7:E0:77:F9:7B:A9:78:C0:22:A8:D7:EE:3D:B3:4C:8F

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3281: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Navy
vfychain -d AllDB -pp -vv      UserBridge.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190657 (0x432f9081)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:01 2012
            Not After : Tue Nov 28 00:07:01 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:42:b1:e1:be:ce:0d:72:0e:c1:9d:ed:e5:55:b7:02:
                    20:f2:33:51:cd:94:3a:bc:58:92:69:1a:94:67:b8:a6:
                    da:13:fe:ec:44:92:4e:af:38:68:43:f8:45:24:03:3e:
                    1b:e8:a2:df:00:16:4f:0c:d4:b7:9a:97:07:23:cc:70:
                    5d:30:65:3d:27:86:51:a2:6a:a9:d9:88:bc:2d:6c:e9:
                    1a:0a:ea:cd:9a:47:28:9b:ef:2a:bb:25:b8:a5:d7:2e:
                    bd:8d:a9:c8:3a:b6:1d:3d:7f:f7:56:29:03:09:cf:2c:
                    a9:ce:90:ea:0f:41:a9:87:d1:82:26:b9:f3:2d:67:cf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        45:17:4c:f1:3f:1a:57:05:fd:07:d1:f2:67:b8:ed:51:
        2c:48:0d:3c:d1:23:c8:a5:24:0a:c5:53:3a:e0:12:10:
        f4:5b:0f:cd:57:ec:85:03:97:ce:0d:73:20:ed:62:d0:
        5e:a2:d2:55:71:7d:51:9d:5d:e4:5e:cd:a8:e6:45:be:
        70:87:04:bb:ff:ef:0d:c3:3e:a8:7e:00:01:96:63:c6:
        bd:9f:51:0e:c2:08:80:45:e8:27:88:d3:e7:32:9d:c9:
        e4:b8:e7:b4:90:17:bc:39:6f:4c:dc:a9:e5:4a:3d:d7:
        3b:84:39:4c:42:f7:ba:f2:d7:80:71:3b:08:fb:3c:28
    Fingerprint (MD5):
        B4:4F:D3:28:A1:10:F8:8C:A1:6C:FC:BB:0C:D1:EE:EB
    Fingerprint (SHA1):
        88:4A:92:15:24:F3:66:90:51:BB:00:9C:35:A5:D0:87:46:97:F8:BC

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3282: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Navy - PASSED
chains.sh: Creating DB ArmyOnlyDB
certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd
chains.sh: #3283: Bridge: Creating DB ArmyOnlyDB  - PASSED
chains.sh: Importing certificate Army.der to ArmyOnlyDB database
certutil -A -n Army  -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der
chains.sh: #3284: Bridge: Importing certificate Army.der to ArmyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #3285: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #3286: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der Navy.der 
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #3287: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der Navy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190657 (0x432f9081)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:01 2012
            Not After : Tue Nov 28 00:07:01 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:42:b1:e1:be:ce:0d:72:0e:c1:9d:ed:e5:55:b7:02:
                    20:f2:33:51:cd:94:3a:bc:58:92:69:1a:94:67:b8:a6:
                    da:13:fe:ec:44:92:4e:af:38:68:43:f8:45:24:03:3e:
                    1b:e8:a2:df:00:16:4f:0c:d4:b7:9a:97:07:23:cc:70:
                    5d:30:65:3d:27:86:51:a2:6a:a9:d9:88:bc:2d:6c:e9:
                    1a:0a:ea:cd:9a:47:28:9b:ef:2a:bb:25:b8:a5:d7:2e:
                    bd:8d:a9:c8:3a:b6:1d:3d:7f:f7:56:29:03:09:cf:2c:
                    a9:ce:90:ea:0f:41:a9:87:d1:82:26:b9:f3:2d:67:cf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        45:17:4c:f1:3f:1a:57:05:fd:07:d1:f2:67:b8:ed:51:
        2c:48:0d:3c:d1:23:c8:a5:24:0a:c5:53:3a:e0:12:10:
        f4:5b:0f:cd:57:ec:85:03:97:ce:0d:73:20:ed:62:d0:
        5e:a2:d2:55:71:7d:51:9d:5d:e4:5e:cd:a8:e6:45:be:
        70:87:04:bb:ff:ef:0d:c3:3e:a8:7e:00:01:96:63:c6:
        bd:9f:51:0e:c2:08:80:45:e8:27:88:d3:e7:32:9d:c9:
        e4:b8:e7:b4:90:17:bc:39:6f:4c:dc:a9:e5:4a:3d:d7:
        3b:84:39:4c:42:f7:ba:f2:d7:80:71:3b:08:fb:3c:28
    Fingerprint (MD5):
        B4:4F:D3:28:A1:10:F8:8C:A1:6C:FC:BB:0C:D1:EE:EB
    Fingerprint (SHA1):
        88:4A:92:15:24:F3:66:90:51:BB:00:9C:35:A5:D0:87:46:97:F8:BC


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3288: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190657 (0x432f9081)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:01 2012
            Not After : Tue Nov 28 00:07:01 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:42:b1:e1:be:ce:0d:72:0e:c1:9d:ed:e5:55:b7:02:
                    20:f2:33:51:cd:94:3a:bc:58:92:69:1a:94:67:b8:a6:
                    da:13:fe:ec:44:92:4e:af:38:68:43:f8:45:24:03:3e:
                    1b:e8:a2:df:00:16:4f:0c:d4:b7:9a:97:07:23:cc:70:
                    5d:30:65:3d:27:86:51:a2:6a:a9:d9:88:bc:2d:6c:e9:
                    1a:0a:ea:cd:9a:47:28:9b:ef:2a:bb:25:b8:a5:d7:2e:
                    bd:8d:a9:c8:3a:b6:1d:3d:7f:f7:56:29:03:09:cf:2c:
                    a9:ce:90:ea:0f:41:a9:87:d1:82:26:b9:f3:2d:67:cf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        45:17:4c:f1:3f:1a:57:05:fd:07:d1:f2:67:b8:ed:51:
        2c:48:0d:3c:d1:23:c8:a5:24:0a:c5:53:3a:e0:12:10:
        f4:5b:0f:cd:57:ec:85:03:97:ce:0d:73:20:ed:62:d0:
        5e:a2:d2:55:71:7d:51:9d:5d:e4:5e:cd:a8:e6:45:be:
        70:87:04:bb:ff:ef:0d:c3:3e:a8:7e:00:01:96:63:c6:
        bd:9f:51:0e:c2:08:80:45:e8:27:88:d3:e7:32:9d:c9:
        e4:b8:e7:b4:90:17:bc:39:6f:4c:dc:a9:e5:4a:3d:d7:
        3b:84:39:4c:42:f7:ba:f2:d7:80:71:3b:08:fb:3c:28
    Fingerprint (MD5):
        B4:4F:D3:28:A1:10:F8:8C:A1:6C:FC:BB:0C:D1:EE:EB
    Fingerprint (SHA1):
        88:4A:92:15:24:F3:66:90:51:BB:00:9C:35:A5:D0:87:46:97:F8:BC


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3289: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     -t Navy.der - PASSED
chains.sh: Creating DB NavyOnlyDB
certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd
chains.sh: #3290: Bridge: Creating DB NavyOnlyDB  - PASSED
chains.sh: Importing certificate Navy.der to NavyOnlyDB database
certutil -A -n Navy  -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der
chains.sh: #3291: Bridge: Importing certificate Navy.der to NavyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #3292: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@army [Certificate Authority]:
Email Address(es): bridge@army
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #3293: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der Army.der 
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #3294: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     -t Army.der
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der Army.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190656 (0x432f9080)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:01 2012
            Not After : Tue Nov 28 00:07:01 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f1:4d:72:3f:6d:aa:2a:b7:bb:a7:35:55:af:2f:f6:62:
                    43:99:c0:3e:93:39:82:c9:6c:2f:ea:1a:bb:20:6b:f5:
                    44:6e:4a:dd:50:c2:3e:9e:6b:aa:f9:a3:47:45:e8:81:
                    83:3b:6f:27:45:ec:4b:93:13:cb:74:11:52:ea:0a:54:
                    e3:dd:70:c9:2e:14:1e:9a:1b:d6:66:d0:20:69:53:4d:
                    20:0f:3c:82:c9:60:a8:2d:b2:74:6f:9a:93:44:d5:58:
                    06:48:f4:f2:11:f6:4e:0b:b8:03:ce:dd:27:7f:12:8a:
                    96:bd:1a:89:05:52:c9:aa:2d:ea:60:8d:04:39:80:cb
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        bb:44:e4:bd:a6:64:cf:05:bc:04:dc:a1:f9:3f:82:cc:
        2d:ea:f5:b5:eb:cd:a1:25:bd:ea:92:3f:75:2f:8a:a9:
        f0:22:46:dc:25:6c:41:f7:8d:e3:de:d8:b0:45:d6:c3:
        d0:57:7e:76:de:81:90:4b:c6:64:f0:b6:00:a7:ac:ca:
        3f:7e:7c:7a:44:a3:f0:6a:81:94:6c:d2:e7:81:b6:b7:
        a6:73:4c:3c:67:a9:ad:c1:36:4a:7b:a6:ce:80:e0:e1:
        e6:05:00:75:53:e4:a5:d4:92:2a:58:94:86:b2:d7:6f:
        80:a6:e6:86:2f:44:c2:0f:c0:32:9d:4c:bd:e2:c8:bd
    Fingerprint (MD5):
        FC:3D:58:EA:E0:3E:78:B0:AA:32:83:BA:5F:7C:7A:99
    Fingerprint (SHA1):
        2A:94:8E:3A:A7:E0:77:F9:7B:A9:78:C0:22:A8:D7:EE:3D:B3:4C:8F


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3295: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     -t Army.der
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190656 (0x432f9080)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:01 2012
            Not After : Tue Nov 28 00:07:01 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f1:4d:72:3f:6d:aa:2a:b7:bb:a7:35:55:af:2f:f6:62:
                    43:99:c0:3e:93:39:82:c9:6c:2f:ea:1a:bb:20:6b:f5:
                    44:6e:4a:dd:50:c2:3e:9e:6b:aa:f9:a3:47:45:e8:81:
                    83:3b:6f:27:45:ec:4b:93:13:cb:74:11:52:ea:0a:54:
                    e3:dd:70:c9:2e:14:1e:9a:1b:d6:66:d0:20:69:53:4d:
                    20:0f:3c:82:c9:60:a8:2d:b2:74:6f:9a:93:44:d5:58:
                    06:48:f4:f2:11:f6:4e:0b:b8:03:ce:dd:27:7f:12:8a:
                    96:bd:1a:89:05:52:c9:aa:2d:ea:60:8d:04:39:80:cb
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        bb:44:e4:bd:a6:64:cf:05:bc:04:dc:a1:f9:3f:82:cc:
        2d:ea:f5:b5:eb:cd:a1:25:bd:ea:92:3f:75:2f:8a:a9:
        f0:22:46:dc:25:6c:41:f7:8d:e3:de:d8:b0:45:d6:c3:
        d0:57:7e:76:de:81:90:4b:c6:64:f0:b6:00:a7:ac:ca:
        3f:7e:7c:7a:44:a3:f0:6a:81:94:6c:d2:e7:81:b6:b7:
        a6:73:4c:3c:67:a9:ad:c1:36:4a:7b:a6:ce:80:e0:e1:
        e6:05:00:75:53:e4:a5:d4:92:2a:58:94:86:b2:d7:6f:
        80:a6:e6:86:2f:44:c2:0f:c0:32:9d:4c:bd:e2:c8:bd
    Fingerprint (MD5):
        FC:3D:58:EA:E0:3E:78:B0:AA:32:83:BA:5F:7C:7A:99
    Fingerprint (SHA1):
        2A:94:8E:3A:A7:E0:77:F9:7B:A9:78:C0:22:A8:D7:EE:3D:B3:4C:8F


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3296: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     -t Army.der - PASSED
chains.sh: Creating DB Root1DB
certutil -N -d Root1DB -f Root1DB/dbpasswd
chains.sh: #3297: MegaBridge_3_2: Creating DB Root1DB  - PASSED
chains.sh: Creating Root CA Root1
certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1  -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190661 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3298: MegaBridge_3_2: Creating Root CA Root1  - PASSED
chains.sh: Exporting Root CA Root1.der
certutil -L -d Root1DB -r -n Root1 -o Root1.der
chains.sh: #3299: MegaBridge_3_2: Exporting Root CA Root1.der  - PASSED
chains.sh: Creating DB Root2DB
certutil -N -d Root2DB -f Root2DB/dbpasswd
chains.sh: #3300: MegaBridge_3_2: Creating DB Root2DB  - PASSED
chains.sh: Creating Root CA Root2
certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2  -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190662 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3301: MegaBridge_3_2: Creating Root CA Root2  - PASSED
chains.sh: Exporting Root CA Root2.der
certutil -L -d Root2DB -r -n Root2 -o Root2.der
chains.sh: #3302: MegaBridge_3_2: Exporting Root CA Root2.der  - PASSED
chains.sh: Creating DB Root3DB
certutil -N -d Root3DB -f Root3DB/dbpasswd
chains.sh: #3303: MegaBridge_3_2: Creating DB Root3DB  - PASSED
chains.sh: Creating Root CA Root3
certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3  -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190663 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3304: MegaBridge_3_2: Creating Root CA Root3  - PASSED
chains.sh: Exporting Root CA Root3.der
certutil -L -d Root3DB -r -n Root3 -o Root3.der
chains.sh: #3305: MegaBridge_3_2: Exporting Root CA Root3.der  - PASSED
chains.sh: Creating DB Root4DB
certutil -N -d Root4DB -f Root4DB/dbpasswd
chains.sh: #3306: MegaBridge_3_2: Creating DB Root4DB  - PASSED
chains.sh: Creating Root CA Root4
certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4  -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190664 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3307: MegaBridge_3_2: Creating Root CA Root4  - PASSED
chains.sh: Exporting Root CA Root4.der
certutil -L -d Root4DB -r -n Root4 -o Root4.der
chains.sh: #3308: MegaBridge_3_2: Exporting Root CA Root4.der  - PASSED
chains.sh: Creating DB Root5DB
certutil -N -d Root5DB -f Root5DB/dbpasswd
chains.sh: #3309: MegaBridge_3_2: Creating DB Root5DB  - PASSED
chains.sh: Creating Root CA Root5
certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5  -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190665 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3310: MegaBridge_3_2: Creating Root CA Root5  - PASSED
chains.sh: Exporting Root CA Root5.der
certutil -L -d Root5DB -r -n Root5 -o Root5.der
chains.sh: #3311: MegaBridge_3_2: Exporting Root CA Root5.der  - PASSED
chains.sh: Creating DB Root6DB
certutil -N -d Root6DB -f Root6DB/dbpasswd
chains.sh: #3312: MegaBridge_3_2: Creating DB Root6DB  - PASSED
chains.sh: Creating Root CA Root6
certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6  -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190666 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3313: MegaBridge_3_2: Creating Root CA Root6  - PASSED
chains.sh: Exporting Root CA Root6.der
certutil -L -d Root6DB -r -n Root6 -o Root6.der
chains.sh: #3314: MegaBridge_3_2: Exporting Root CA Root6.der  - PASSED
chains.sh: Creating DB Root7DB
certutil -N -d Root7DB -f Root7DB/dbpasswd
chains.sh: #3315: MegaBridge_3_2: Creating DB Root7DB  - PASSED
chains.sh: Creating Root CA Root7
certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7  -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190667 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3316: MegaBridge_3_2: Creating Root CA Root7  - PASSED
chains.sh: Exporting Root CA Root7.der
certutil -L -d Root7DB -r -n Root7 -o Root7.der
chains.sh: #3317: MegaBridge_3_2: Exporting Root CA Root7.der  - PASSED
chains.sh: Creating DB Root8DB
certutil -N -d Root8DB -f Root8DB/dbpasswd
chains.sh: #3318: MegaBridge_3_2: Creating DB Root8DB  - PASSED
chains.sh: Creating Root CA Root8
certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8  -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190668 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3319: MegaBridge_3_2: Creating Root CA Root8  - PASSED
chains.sh: Exporting Root CA Root8.der
certutil -L -d Root8DB -r -n Root8 -o Root8.der
chains.sh: #3320: MegaBridge_3_2: Exporting Root CA Root8.der  - PASSED
chains.sh: Creating DB Root9DB
certutil -N -d Root9DB -f Root9DB/dbpasswd
chains.sh: #3321: MegaBridge_3_2: Creating DB Root9DB  - PASSED
chains.sh: Creating Root CA Root9
certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9  -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190669 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3322: MegaBridge_3_2: Creating Root CA Root9  - PASSED
chains.sh: Exporting Root CA Root9.der
certutil -L -d Root9DB -r -n Root9 -o Root9.der
chains.sh: #3323: MegaBridge_3_2: Exporting Root CA Root9.der  - PASSED
chains.sh: Creating DB Bridge11DB
certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd
chains.sh: #3324: MegaBridge_3_2: Creating DB Bridge11DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge11Req.der
certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US"  -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o Bridge11Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3325: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der  - PASSED
chains.sh: Creating certficate Bridge11Root1.der signed by Root1
certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1127190670 -7 Bridge11@Root1  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3326: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1  - PASSED
chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der
chains.sh: #3327: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root2.der signed by Root2
certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1127190671 -7 Bridge11@Root2  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3328: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2  - PASSED
chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der
chains.sh: #3329: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root3.der signed by Root3
certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1127190672 -7 Bridge11@Root3  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3330: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3  - PASSED
chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der
chains.sh: #3331: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge11DB database
cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7
chains.sh: #3332: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database  - PASSED
chains.sh: Creating DB Bridge12DB
certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd
chains.sh: #3333: MegaBridge_3_2: Creating DB Bridge12DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge12Req.der
certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US"  -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o Bridge12Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3334: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der  - PASSED
chains.sh: Creating certficate Bridge12Root4.der signed by Root4
certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1127190673 -7 Bridge12@Root4  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3335: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4  - PASSED
chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der
chains.sh: #3336: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root5.der signed by Root5
certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1127190674 -7 Bridge12@Root5  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3337: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5  - PASSED
chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der
chains.sh: #3338: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root6.der signed by Root6
certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1127190675 -7 Bridge12@Root6  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3339: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6  - PASSED
chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der
chains.sh: #3340: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge12DB database
cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7
chains.sh: #3341: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database  - PASSED
chains.sh: Creating DB Bridge13DB
certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd
chains.sh: #3342: MegaBridge_3_2: Creating DB Bridge13DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge13Req.der
certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US"  -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o Bridge13Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3343: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der  - PASSED
chains.sh: Creating certficate Bridge13Root7.der signed by Root7
certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1127190676 -7 Bridge13@Root7  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3344: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7  - PASSED
chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der
chains.sh: #3345: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root8.der signed by Root8
certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1127190677 -7 Bridge13@Root8  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3346: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8  - PASSED
chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der
chains.sh: #3347: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root9.der signed by Root9
certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1127190678 -7 Bridge13@Root9  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3348: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9  - PASSED
chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der
chains.sh: #3349: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge13DB database
cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7
chains.sh: #3350: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database  - PASSED
chains.sh: Creating DB Bridge21DB
certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd
chains.sh: #3351: MegaBridge_3_2: Creating DB Bridge21DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge21Req.der
certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US"  -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o Bridge21Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3352: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der  - PASSED
chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11
certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1127190679 -7 Bridge21@Bridge11  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3353: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11  - PASSED
chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der
chains.sh: #3354: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12
certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1127190680 -7 Bridge21@Bridge12  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3355: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12  - PASSED
chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der
chains.sh: #3356: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13
certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1127190681 -7 Bridge21@Bridge13  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3357: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13  - PASSED
chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der
chains.sh: #3358: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge21DB database
cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7
chains.sh: #3359: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3360: MegaBridge_3_2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3361: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21
certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1127190682   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3362: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21  - PASSED
chains.sh: Importing certificate CA1Bridge21.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der
chains.sh: #3363: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3364: MegaBridge_3_2: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3365: MegaBridge_3_2: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127190683   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3366: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #3367: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags  -d EE1DB     -t Root1.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der  -t Root1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190661 (0x432f9085)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root1 ROOT CA,O=Root1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:03 2012
            Not After : Tue Nov 28 00:07:03 2062
        Subject: "CN=Root1 ROOT CA,O=Root1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:09:d1:57:3d:13:90:fe:b8:29:a9:a4:3f:1a:5c:cc:
                    ad:55:ce:a8:48:c2:b6:58:d4:8c:c1:ea:4a:11:fb:97:
                    85:93:b5:0e:ea:f0:52:18:60:9c:87:96:be:19:d6:21:
                    1f:92:b9:44:9b:84:0b:bf:72:ad:d4:42:14:6f:f1:80:
                    2f:c7:f0:b2:26:ee:c6:1c:53:25:ee:dc:79:0f:c0:74:
                    a1:85:ca:9c:1c:54:c7:0e:db:43:11:63:c1:0a:d0:f4:
                    30:4a:2e:cd:ab:a5:4b:65:2e:cf:18:e1:e6:f5:f1:da:
                    30:e3:c8:20:9d:03:9c:e3:7f:de:37:a9:ef:ed:d2:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3c:9f:8e:11:cb:43:3a:5b:1a:e1:54:02:82:5f:71:04:
        0c:ea:0a:3b:ea:b4:46:e1:15:47:57:d2:13:78:a1:7f:
        39:c9:e6:1f:ce:e9:ad:f7:63:b8:a6:03:11:4b:32:26:
        0c:de:18:6d:2f:5a:43:ed:0f:b4:d7:1f:3e:dd:e5:5f:
        22:03:29:a4:be:47:f6:db:5f:71:43:af:8f:08:de:09:
        44:49:75:a3:7b:a5:62:56:16:0f:3f:b7:e7:ac:72:81:
        a9:e5:cc:15:df:30:37:fd:a0:17:61:a5:dd:51:a4:98:
        1a:f1:7c:a8:31:3e:dc:70:ca:f5:4a:76:d4:67:30:83
    Fingerprint (MD5):
        3F:CD:56:FC:E6:D8:F5:79:B3:54:68:2F:26:E5:A6:5D
    Fingerprint (SHA1):
        46:C8:23:40:F4:13:B9:DD:BD:A3:9F:73:CF:84:B5:D7:75:49:06:E0


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #3368: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags  -d EE1DB     -t Root1.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags  -d EE1DB     -t Root2.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der  -t Root2.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190662 (0x432f9086)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root2 ROOT CA,O=Root2,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:03 2012
            Not After : Tue Nov 28 00:07:03 2062
        Subject: "CN=Root2 ROOT CA,O=Root2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:a8:8e:dd:13:bc:aa:09:57:e5:44:52:c2:1f:60:1c:
                    d7:9f:c9:bf:d9:36:a1:86:37:e9:95:a0:aa:39:33:1c:
                    ba:ac:dc:6c:d0:73:32:e6:7c:16:e6:08:de:d1:58:eb:
                    b1:57:89:9d:23:72:94:7f:67:e9:0f:b3:27:3d:bb:47:
                    41:21:39:35:11:67:77:b2:52:32:5b:9e:a3:65:3c:c1:
                    c5:f3:86:69:72:2f:8c:36:47:87:74:a6:2d:8a:a7:fc:
                    d0:0a:12:71:15:b8:ed:c6:8f:37:df:89:11:1e:0e:4b:
                    a7:f7:fa:49:3a:0d:ec:ad:61:8b:ec:27:e5:29:86:55
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        17:36:9e:f9:66:83:22:02:36:5e:d5:ac:5b:b2:4a:95:
        3e:a4:3f:1f:bb:29:04:99:5e:ca:03:c1:ac:42:62:2a:
        5d:35:4f:e7:c6:5c:11:ea:14:1f:f3:6b:0e:5e:e6:e4:
        06:84:5b:ef:e6:7c:05:48:4a:fa:6a:c5:7c:d0:13:86:
        39:48:5c:56:dd:74:1d:73:13:d7:a2:99:4c:d1:6b:5a:
        1b:3c:71:de:24:40:08:a2:92:ab:53:2a:14:75:2d:63:
        60:ea:63:33:d1:60:ba:82:8f:f3:a5:19:7c:de:f7:4d:
        10:13:98:26:a5:3a:4e:95:24:90:9a:66:09:01:86:8a
    Fingerprint (MD5):
        1C:CD:A6:C6:84:E2:73:7A:BD:49:5E:9E:D1:BB:EA:F9
    Fingerprint (SHA1):
        CF:65:07:DC:B3:CC:A9:34:91:0B:83:BE:D6:BB:C8:E2:A1:A3:4E:20


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #3369: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags  -d EE1DB     -t Root2.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags  -d EE1DB     -t Root3.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der  -t Root3.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190663 (0x432f9087)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root3 ROOT CA,O=Root3,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:03 2012
            Not After : Tue Nov 28 00:07:03 2062
        Subject: "CN=Root3 ROOT CA,O=Root3,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:1b:bb:d5:b5:08:d7:8c:ed:08:5b:65:43:60:9d:49:
                    6b:51:24:63:07:53:d5:53:d5:af:85:a8:50:1d:ef:84:
                    c4:07:b9:f9:f3:2b:1a:ba:3e:0e:b7:19:d9:d5:f6:db:
                    01:d1:ee:60:59:2c:af:16:2a:6f:1b:64:54:b6:08:18:
                    f9:c8:bd:ac:fb:0d:b6:72:b5:75:83:f5:30:68:0d:de:
                    82:f0:93:77:63:f4:df:b4:56:19:3a:a5:38:b3:b2:c6:
                    24:25:f7:83:cf:53:31:7c:7f:3d:87:b1:32:1d:f0:68:
                    00:80:3a:ca:1d:87:14:d5:2a:3a:66:c7:ba:97:e4:09
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a5:f4:34:2b:05:cb:ec:03:96:04:75:e5:1e:e7:19:97:
        2e:58:8c:36:7e:3e:4c:51:68:b3:43:e9:33:f9:7c:af:
        e5:62:e9:6c:50:a1:99:97:71:15:a9:3b:04:2e:f5:83:
        31:16:85:16:7f:c3:18:6d:2e:7d:fc:8c:4b:7d:5a:c2:
        91:06:bd:0a:ce:9d:eb:15:5a:60:33:34:7a:2f:cc:8d:
        98:22:f4:14:0b:29:1c:c0:9f:bf:ec:2f:f7:a0:36:be:
        95:8f:73:e9:ad:54:f2:db:4b:70:0c:80:41:46:63:8c:
        7a:e3:fc:ef:50:0f:e3:fa:e8:67:02:1e:7a:ab:20:f8
    Fingerprint (MD5):
        5A:1D:38:A4:0B:34:56:8F:CF:43:91:37:77:AB:E3:34
    Fingerprint (SHA1):
        A2:4D:4A:F3:0E:39:CB:98:04:AE:FA:7C:C2:4D:E2:F4:F5:B2:71:27


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #3370: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags  -d EE1DB     -t Root3.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags  -d EE1DB     -t Root4.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der  -t Root4.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190664 (0x432f9088)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root4 ROOT CA,O=Root4,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:04 2012
            Not After : Tue Nov 28 00:07:04 2062
        Subject: "CN=Root4 ROOT CA,O=Root4,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b1:3d:00:d4:f4:13:4c:5e:08:18:73:07:4c:c2:29:a1:
                    03:e5:42:1f:e6:e7:37:4d:e1:ed:78:b7:58:ac:95:fb:
                    22:b7:83:23:e9:db:51:af:21:18:4a:c9:86:84:45:f0:
                    c8:3f:4d:b9:4c:59:04:6e:1b:1c:29:47:fe:fc:de:2e:
                    4e:a2:7b:23:04:5b:2e:02:05:a2:5c:06:eb:df:eb:a1:
                    18:23:ce:2b:2e:29:79:db:ac:70:82:63:52:f3:5a:50:
                    ec:b6:2c:77:96:4f:61:56:80:14:e5:5c:e8:ec:7d:a0:
                    14:29:a6:20:73:46:02:6d:b6:d0:64:ba:68:36:0c:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        97:96:5f:46:ac:3d:e7:3d:c0:8f:86:c4:a3:5a:2c:f8:
        52:4a:2a:49:ff:ce:d8:b9:46:ba:aa:93:0a:48:f2:36:
        41:b9:4a:1d:b6:2c:50:d5:2f:9f:29:90:b8:a1:2c:44:
        b7:39:91:f6:e1:63:f2:65:fa:b3:11:b9:b5:75:14:5c:
        fd:fd:72:f5:23:56:87:e5:b6:2f:ee:55:6e:98:3e:30:
        cb:95:74:48:11:53:fe:0e:b1:91:64:40:d7:3e:11:10:
        2d:0b:23:42:f5:ab:2d:af:f6:c3:34:24:d2:5c:16:19:
        72:f8:dd:80:26:ee:ae:a6:a4:9e:10:1a:d1:82:fc:ad
    Fingerprint (MD5):
        9B:AC:58:A1:B7:A9:40:54:CC:E1:87:B8:72:C2:35:3D
    Fingerprint (SHA1):
        3C:8A:C9:CC:D6:C5:27:8A:F9:A7:36:06:21:77:2B:2E:75:09:F3:D0


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #3371: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags  -d EE1DB     -t Root4.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags  -d EE1DB     -t Root5.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der  -t Root5.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190665 (0x432f9089)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root5 ROOT CA,O=Root5,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:04 2012
            Not After : Tue Nov 28 00:07:04 2062
        Subject: "CN=Root5 ROOT CA,O=Root5,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cd:c9:6c:6b:b2:9b:e7:4a:6d:69:1a:e9:b6:e6:25:33:
                    39:20:53:fe:c1:d2:96:ea:35:e9:7d:0d:91:9c:df:2f:
                    4c:97:be:a2:c2:e5:06:0d:50:54:72:a7:ea:93:cf:e3:
                    8d:c3:c0:e5:86:47:4a:05:a6:b9:04:05:70:a6:c2:47:
                    aa:3d:4a:3b:60:80:8e:c2:53:bd:4c:17:f0:5f:06:9a:
                    c4:e6:f5:1b:ae:b6:6b:10:5c:e7:dc:69:90:36:07:f0:
                    58:d2:97:e8:47:1c:aa:25:c5:3f:d0:e4:74:c4:8d:3e:
                    8e:ee:9e:29:d1:a2:28:5a:37:ed:5f:3f:8c:4f:3c:13
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        33:70:09:c1:d1:13:06:d0:88:e9:e8:56:77:71:74:fa:
        05:a9:75:c0:b1:f3:62:c9:b9:5a:15:79:49:f0:b9:e0:
        ae:0a:ec:93:8d:ff:98:33:5b:f9:f0:df:e6:39:19:cd:
        82:d8:5b:63:54:32:60:06:62:9e:95:b8:13:9e:8e:8c:
        ed:44:d3:04:fa:58:f3:b3:7f:8d:d3:0d:ce:92:e5:01:
        2b:ba:2b:2d:b4:c5:30:61:50:6c:f1:e9:36:c8:a4:17:
        7c:0c:cf:6f:f8:25:c1:a3:06:4b:e8:56:88:2e:09:e3:
        82:a9:ac:53:d9:0b:a9:72:63:80:46:84:79:1b:08:c6
    Fingerprint (MD5):
        EC:81:86:53:0A:38:0A:01:96:B0:DC:3B:6E:CD:CC:08
    Fingerprint (SHA1):
        3C:79:D6:21:D1:F7:BA:59:FD:33:18:88:59:DB:18:38:FC:AC:B9:34


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #3372: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags  -d EE1DB     -t Root5.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags  -d EE1DB     -t Root6.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der  -t Root6.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190666 (0x432f908a)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root6 ROOT CA,O=Root6,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:04 2012
            Not After : Tue Nov 28 00:07:04 2062
        Subject: "CN=Root6 ROOT CA,O=Root6,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:a2:93:22:82:9b:2e:d8:4d:b6:9b:b1:8b:2c:25:b6:
                    5a:fa:80:41:7b:0d:e2:40:d7:de:bf:46:6f:63:50:15:
                    50:89:b7:6f:af:85:6b:0d:82:08:93:98:c9:ed:01:c8:
                    c3:c1:15:65:8a:b7:83:ab:f2:d9:b2:48:5f:3b:9d:af:
                    12:ba:1b:8a:84:ca:6e:c1:f2:a5:f1:6a:ed:d5:90:80:
                    79:71:bd:51:17:46:90:56:74:9b:dd:8f:0e:7b:61:c6:
                    57:33:04:d0:63:df:01:21:2c:b6:c9:40:ed:53:87:ef:
                    da:e3:f9:a6:cc:c5:e9:a0:3f:64:c7:7c:e1:21:ef:f3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8f:31:1a:6f:72:33:82:77:d9:c1:46:a0:d4:57:23:4d:
        38:94:54:de:e0:84:de:86:41:37:64:03:50:79:77:3d:
        0c:3e:72:67:b6:3c:ba:ec:86:ab:d6:23:d4:77:c5:7f:
        e2:9a:50:d1:79:2d:8e:5c:67:86:49:ac:3a:01:24:6d:
        5c:7c:80:fe:81:68:f7:75:a7:2f:4a:85:fb:92:b9:da:
        4e:5a:1d:75:47:ca:83:a8:04:5f:f5:f1:2e:e1:d4:b9:
        82:d6:5f:82:39:02:e9:e5:e9:59:ee:53:83:f0:18:0e:
        88:73:b4:3d:fa:e2:b7:c8:0e:33:27:8e:d3:cc:00:7d
    Fingerprint (MD5):
        5A:57:0D:5B:19:38:8E:DC:E5:98:8F:5C:63:E6:5D:C7
    Fingerprint (SHA1):
        9C:59:FF:B5:5D:EB:10:C4:E4:40:BE:5A:6F:69:97:84:28:FB:80:90


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #3373: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags  -d EE1DB     -t Root6.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags  -d EE1DB     -t Root7.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der  -t Root7.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190667 (0x432f908b)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root7 ROOT CA,O=Root7,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:04 2012
            Not After : Tue Nov 28 00:07:04 2062
        Subject: "CN=Root7 ROOT CA,O=Root7,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:c3:40:dd:34:33:1f:cf:d6:0b:ad:3a:33:61:26:e9:
                    01:65:b4:17:c9:18:34:dd:da:4d:41:9a:d5:d2:9f:2c:
                    7f:09:dc:a2:0e:25:5a:c5:89:38:01:40:d0:73:15:9e:
                    e5:f4:63:ff:e2:a4:fc:98:fa:a2:c0:d6:fe:9a:03:4a:
                    15:b5:9f:84:3f:9a:34:c9:c9:28:8b:33:44:5f:29:13:
                    91:8f:56:01:ea:06:6d:c9:0b:22:cd:e3:ac:76:ca:f2:
                    9d:72:d8:26:33:7d:e6:57:02:b2:b4:ff:69:a8:f3:6c:
                    a0:39:ef:44:56:04:95:c7:f3:06:15:4c:6b:b3:93:2d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b4:a2:af:60:d6:41:75:30:32:83:0d:6d:0c:11:9a:81:
        73:ae:bd:70:fc:19:ec:57:1e:bc:64:ce:9b:7b:f0:a3:
        ac:7d:6d:2d:8a:a6:c8:b9:f0:7a:82:6c:0c:0d:a6:fb:
        1c:d2:a7:94:b7:f4:f1:90:63:87:4d:57:be:f0:d4:f9:
        56:91:56:46:09:f0:4d:0c:75:c2:4b:6a:40:a6:46:f5:
        b4:8f:95:37:31:ae:f4:35:24:57:cf:ae:78:54:0c:71:
        1c:df:25:c6:06:e8:06:a9:05:27:52:02:75:d5:9e:2d:
        7e:64:c5:60:4e:5a:e8:13:ea:b7:37:4c:73:eb:0c:a3
    Fingerprint (MD5):
        B1:5B:FF:65:3F:F1:A8:A4:7D:14:D8:45:2E:93:05:CB
    Fingerprint (SHA1):
        2A:28:21:2A:AB:38:3F:14:92:A5:B9:F9:01:9B:1A:3F:38:EF:3C:86


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #3374: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags  -d EE1DB     -t Root7.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags  -d EE1DB     -t Root8.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der  -t Root8.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190668 (0x432f908c)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root8 ROOT CA,O=Root8,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:05 2012
            Not After : Tue Nov 28 00:07:05 2062
        Subject: "CN=Root8 ROOT CA,O=Root8,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:d4:55:2a:53:94:5c:be:d6:22:70:e0:0a:26:df:a0:
                    1f:33:e6:37:b3:59:7a:53:f0:28:31:46:c9:80:4a:e2:
                    76:fe:92:61:78:a4:e6:44:15:ba:66:49:c9:93:99:05:
                    20:5b:35:ee:2a:92:b9:5e:24:b0:e3:d1:cf:ce:6b:5c:
                    9f:ab:48:3d:75:70:65:88:c1:8d:b4:83:01:ed:e1:72:
                    e3:6e:cc:4e:b8:30:37:e7:38:8a:97:5d:66:33:22:77:
                    b3:98:64:b1:cc:40:06:b0:17:30:b9:15:86:ef:ed:ba:
                    10:4d:42:d4:52:62:d8:de:e2:88:59:b3:05:c0:3f:b5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a5:92:8e:d0:ca:e3:22:f1:36:94:16:63:44:16:3d:95:
        b3:d9:53:9c:bd:89:87:3b:54:aa:93:f6:ee:65:de:4b:
        d0:ee:83:99:f7:3d:68:2f:40:72:de:37:ec:7b:ab:bd:
        b0:a9:c4:04:29:3f:8a:3c:2b:35:bc:5b:d2:c4:20:6e:
        d1:27:6b:db:a7:33:5f:15:51:80:d8:14:d5:0d:e2:eb:
        e7:5e:38:22:c9:a9:7c:5c:99:09:6a:f3:1c:f6:00:8b:
        21:c1:52:2b:98:a5:8a:7b:fa:17:0f:7e:cc:d9:29:68:
        d1:61:d8:4b:a8:b2:d2:ab:ad:c5:da:bb:6f:67:4a:02
    Fingerprint (MD5):
        46:B8:B7:11:81:17:EE:32:3C:74:F3:C9:EC:B5:FB:CF
    Fingerprint (SHA1):
        0B:64:B5:EE:EF:1A:22:61:A4:96:C4:10:85:82:72:4B:9A:50:91:9E


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #3375: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags  -d EE1DB     -t Root8.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags  -d EE1DB     -t Root9.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der  -t Root9.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190669 (0x432f908d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root9 ROOT CA,O=Root9,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:05 2012
            Not After : Tue Nov 28 00:07:05 2062
        Subject: "CN=Root9 ROOT CA,O=Root9,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f0:ae:c4:08:55:7c:eb:ad:21:8e:9b:71:5d:fd:aa:ed:
                    ff:fe:e3:6b:36:38:3e:58:39:ef:c7:4f:1e:6a:ea:9b:
                    09:c9:f9:6b:1d:b5:c0:c6:d4:f0:da:4f:99:37:d0:25:
                    e9:fe:da:9c:b8:b7:07:34:3d:1b:81:d9:68:f9:db:f7:
                    55:f1:f8:ba:12:da:1e:51:5c:8c:10:49:da:00:0e:ca:
                    a1:6a:a6:62:0d:2e:77:af:a4:c6:9a:2a:e0:14:93:15:
                    5e:07:4b:43:35:d8:56:66:cf:6c:e4:d7:a9:b2:48:c7:
                    89:7d:28:d1:12:8c:f8:4a:31:02:ae:12:30:9b:f4:d9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        63:7f:42:46:63:a8:5c:f8:9a:c3:d5:2a:a9:5d:3a:fa:
        4d:18:b7:d6:1b:4c:9f:50:8c:5d:d7:27:fe:11:9c:ff:
        02:5f:03:e8:0a:07:37:63:a0:8d:7b:eb:a8:28:b1:1a:
        88:82:4c:19:e7:11:52:7c:92:7c:6e:f0:79:68:c7:3d:
        4e:1e:67:31:86:97:18:6d:cc:d6:cc:e5:f1:fe:e4:f2:
        24:60:95:49:e0:7a:31:e8:ba:03:14:b3:f9:31:d6:db:
        8e:2b:b4:31:4c:2f:a7:a1:4d:08:6a:51:52:db:85:db:
        68:d8:59:cf:c3:57:4e:31:8a:fd:61:7a:38:05:5a:dc
    Fingerprint (MD5):
        4E:1F:11:4B:5B:CD:5F:96:0D:AA:92:83:23:C1:FE:E6
    Fingerprint (SHA1):
        1E:78:CD:90:6E:CC:D1:88:01:AC:F1:3D:B0:98:43:4F:28:9A:91:E1


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #3376: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags  -d EE1DB     -t Root9.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3377: Extension: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190684 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3378: Extension: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3379: Extension: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3380: Extension: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3381: Extension: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127190685   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3382: Extension: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #3383: Extension: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3384: Extension: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3385: Extension: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127190686   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3386: Extension: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #3387: Extension: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #3388: Extension: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3389: Extension: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1127190687   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3390: Extension: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #3391: Extension: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3392: Extension: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190684 (0x432f909c)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:08 2012
            Not After : Tue Nov 28 00:07:08 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:9f:87:ae:4c:2d:da:75:0c:c0:65:d2:c1:61:8c:84:
                    81:23:70:2e:93:d5:90:fb:98:40:a5:b9:50:31:f0:95:
                    38:30:66:e6:18:6d:87:65:f3:fe:7f:22:9f:24:b8:2b:
                    42:4d:fd:cd:bf:98:73:d7:b5:7f:8c:08:b6:6a:c3:49:
                    43:38:36:e8:ba:05:57:13:2b:04:b5:dd:f8:11:a0:fc:
                    bc:02:9d:c0:ae:9c:57:7b:9a:04:25:a8:a8:1d:9b:83:
                    46:ba:48:2c:12:11:b1:1e:93:3f:e6:fc:59:9f:a7:2d:
                    73:68:fd:e5:6c:cb:9e:d6:d1:a2:55:54:92:74:44:13
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        16:10:55:6f:89:b6:6f:ea:18:9d:6a:6a:cc:14:aa:dd:
        2b:2a:e3:12:f1:42:72:a7:cb:a2:91:fd:d0:5c:43:d8:
        bd:e1:b6:92:91:eb:3e:a6:c2:95:1f:55:98:d2:0d:96:
        58:aa:5e:f1:c1:bd:ec:b7:99:8c:58:f5:e3:50:6f:8e:
        89:59:f5:f9:d7:14:d2:0c:48:e5:80:1b:1f:95:31:6f:
        b7:90:85:59:b9:ee:e6:a0:83:dc:7d:83:a2:53:fb:ce:
        ae:94:67:7c:1d:a8:cb:0b:ad:b3:48:d8:15:80:78:c9:
        4a:6f:5a:a4:2b:53:32:58:9d:b8:2a:86:e1:a5:25:be
    Fingerprint (MD5):
        69:56:3B:5D:22:52:A3:24:B5:BC:F1:E2:E6:FD:0E:EC
    Fingerprint (SHA1):
        90:03:C4:7B:72:23:C2:D1:2C:56:0F:4A:D0:74:0B:03:41:06:D1:20


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3393: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3394: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190685 (0x432f909d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:09 2012
            Not After : Tue Nov 28 00:07:09 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:9b:50:80:d3:40:26:39:78:6d:b9:12:58:ba:f7:bd:
                    98:81:da:71:14:40:73:8f:e1:dc:d2:15:d0:92:4d:ca:
                    b2:c3:de:21:3b:6b:63:a2:f6:0b:95:d9:52:af:f4:9a:
                    fc:44:9c:78:7d:a2:90:df:a3:fe:26:3e:e7:7b:ed:1a:
                    0f:b9:fa:fe:be:f0:d5:e3:60:f8:27:75:2e:27:11:e9:
                    97:4c:92:5a:ef:1c:bf:8d:57:93:b2:23:b4:f2:b7:a0:
                    d8:27:b7:1c:1a:71:af:bd:c3:37:6a:e3:bd:69:75:65:
                    f4:ee:9f:13:5b:4a:6a:ac:31:d4:ce:05:89:95:db:fb
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        15:e6:65:8e:0c:b5:ae:ae:e6:d0:db:4c:9b:98:41:a5:
        5f:a4:c3:2b:98:27:eb:8e:44:8e:09:4f:38:42:55:8c:
        f3:4a:23:52:29:04:54:3c:ae:a8:2e:86:66:f6:cf:1d:
        16:94:87:ed:2c:79:d5:88:a8:d6:52:8d:4d:39:eb:37:
        17:ad:fb:3a:e2:45:1b:b4:09:00:43:2d:3e:d0:a6:dc:
        82:5d:25:95:0b:0d:c2:e6:58:66:ea:d1:f3:4c:b0:99:
        8b:87:1a:b1:b3:65:eb:0a:dd:e8:a5:7e:38:77:86:db:
        54:d8:c8:d4:29:b9:88:c8:ee:a1:99:ea:73:e3:27:e7
    Fingerprint (MD5):
        15:4E:D0:FC:BA:AB:FA:21:34:0B:E1:58:DF:60:54:97
    Fingerprint (SHA1):
        BD:CE:B0:9B:39:A9:13:FE:73:2F:A3:BD:90:78:A3:1E:17:11:8A:D5


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3395: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3396: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190686 (0x432f909e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:09 2012
            Not After : Tue Nov 28 00:07:09 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    fa:aa:4f:96:6e:c5:61:0d:fd:ab:4f:c2:3c:01:58:14:
                    43:5d:9e:40:26:0f:99:ff:2d:bd:c6:43:87:5b:4a:73:
                    96:10:12:b1:29:91:55:3b:cd:ec:06:eb:01:1b:ba:46:
                    4f:16:c7:a7:1b:10:eb:95:09:1f:0c:9e:3d:16:fc:52:
                    e2:13:a3:be:c5:ca:65:49:6c:8f:ff:e8:16:e9:e4:43:
                    7e:3d:74:77:fb:7a:4a:b1:df:3d:42:04:72:5c:d2:78:
                    47:b3:4a:13:ff:de:b6:bc:f8:f3:e9:c1:b1:24:c9:1a:
                    be:5e:27:90:ed:49:a1:25:04:5b:74:3d:48:8e:00:cb
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        19:c2:82:43:f7:ae:69:a6:60:73:05:80:59:a0:cd:83:
        86:8d:02:d4:6d:9b:33:60:0c:3d:18:32:5c:b2:cc:22:
        bf:83:8d:fa:28:4c:7b:c6:05:6c:47:e3:3a:50:25:2b:
        c3:35:a7:9b:9e:a4:0a:bb:e9:d0:b0:01:b2:63:07:99:
        46:cc:1e:c2:04:17:da:f6:10:a1:24:b2:f1:92:94:5c:
        86:57:fa:11:f7:d7:65:da:4e:02:95:d0:cd:24:28:e3:
        46:cd:a0:27:73:ca:40:ac:58:74:5e:e2:b2:dc:e7:30:
        1d:20:23:1f:18:d9:4a:df:5c:b6:e8:41:eb:c7:ff:0d
    Fingerprint (MD5):
        E4:E0:8B:C2:D1:27:83:38:70:BC:C9:14:A6:37:4A:80
    Fingerprint (SHA1):
        72:CA:1C:96:DC:C5:D6:F8:87:9F:31:6F:C6:17:0A:E3:EF:54:DF:13


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #3397: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3398: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3399: Extension: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #3400: Extension: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3401: Extension: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190684 (0x432f909c)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:08 2012
            Not After : Tue Nov 28 00:07:08 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:9f:87:ae:4c:2d:da:75:0c:c0:65:d2:c1:61:8c:84:
                    81:23:70:2e:93:d5:90:fb:98:40:a5:b9:50:31:f0:95:
                    38:30:66:e6:18:6d:87:65:f3:fe:7f:22:9f:24:b8:2b:
                    42:4d:fd:cd:bf:98:73:d7:b5:7f:8c:08:b6:6a:c3:49:
                    43:38:36:e8:ba:05:57:13:2b:04:b5:dd:f8:11:a0:fc:
                    bc:02:9d:c0:ae:9c:57:7b:9a:04:25:a8:a8:1d:9b:83:
                    46:ba:48:2c:12:11:b1:1e:93:3f:e6:fc:59:9f:a7:2d:
                    73:68:fd:e5:6c:cb:9e:d6:d1:a2:55:54:92:74:44:13
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        16:10:55:6f:89:b6:6f:ea:18:9d:6a:6a:cc:14:aa:dd:
        2b:2a:e3:12:f1:42:72:a7:cb:a2:91:fd:d0:5c:43:d8:
        bd:e1:b6:92:91:eb:3e:a6:c2:95:1f:55:98:d2:0d:96:
        58:aa:5e:f1:c1:bd:ec:b7:99:8c:58:f5:e3:50:6f:8e:
        89:59:f5:f9:d7:14:d2:0c:48:e5:80:1b:1f:95:31:6f:
        b7:90:85:59:b9:ee:e6:a0:83:dc:7d:83:a2:53:fb:ce:
        ae:94:67:7c:1d:a8:cb:0b:ad:b3:48:d8:15:80:78:c9:
        4a:6f:5a:a4:2b:53:32:58:9d:b8:2a:86:e1:a5:25:be
    Fingerprint (MD5):
        69:56:3B:5D:22:52:A3:24:B5:BC:F1:E2:E6:FD:0E:EC
    Fingerprint (SHA1):
        90:03:C4:7B:72:23:C2:D1:2C:56:0F:4A:D0:74:0B:03:41:06:D1:20

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3402: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3403: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190685 (0x432f909d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:09 2012
            Not After : Tue Nov 28 00:07:09 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:9b:50:80:d3:40:26:39:78:6d:b9:12:58:ba:f7:bd:
                    98:81:da:71:14:40:73:8f:e1:dc:d2:15:d0:92:4d:ca:
                    b2:c3:de:21:3b:6b:63:a2:f6:0b:95:d9:52:af:f4:9a:
                    fc:44:9c:78:7d:a2:90:df:a3:fe:26:3e:e7:7b:ed:1a:
                    0f:b9:fa:fe:be:f0:d5:e3:60:f8:27:75:2e:27:11:e9:
                    97:4c:92:5a:ef:1c:bf:8d:57:93:b2:23:b4:f2:b7:a0:
                    d8:27:b7:1c:1a:71:af:bd:c3:37:6a:e3:bd:69:75:65:
                    f4:ee:9f:13:5b:4a:6a:ac:31:d4:ce:05:89:95:db:fb
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        15:e6:65:8e:0c:b5:ae:ae:e6:d0:db:4c:9b:98:41:a5:
        5f:a4:c3:2b:98:27:eb:8e:44:8e:09:4f:38:42:55:8c:
        f3:4a:23:52:29:04:54:3c:ae:a8:2e:86:66:f6:cf:1d:
        16:94:87:ed:2c:79:d5:88:a8:d6:52:8d:4d:39:eb:37:
        17:ad:fb:3a:e2:45:1b:b4:09:00:43:2d:3e:d0:a6:dc:
        82:5d:25:95:0b:0d:c2:e6:58:66:ea:d1:f3:4c:b0:99:
        8b:87:1a:b1:b3:65:eb:0a:dd:e8:a5:7e:38:77:86:db:
        54:d8:c8:d4:29:b9:88:c8:ee:a1:99:ea:73:e3:27:e7
    Fingerprint (MD5):
        15:4E:D0:FC:BA:AB:FA:21:34:0B:E1:58:DF:60:54:97
    Fingerprint (SHA1):
        BD:CE:B0:9B:39:A9:13:FE:73:2F:A3:BD:90:78:A3:1E:17:11:8A:D5

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3404: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3405: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190686 (0x432f909e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:09 2012
            Not After : Tue Nov 28 00:07:09 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    fa:aa:4f:96:6e:c5:61:0d:fd:ab:4f:c2:3c:01:58:14:
                    43:5d:9e:40:26:0f:99:ff:2d:bd:c6:43:87:5b:4a:73:
                    96:10:12:b1:29:91:55:3b:cd:ec:06:eb:01:1b:ba:46:
                    4f:16:c7:a7:1b:10:eb:95:09:1f:0c:9e:3d:16:fc:52:
                    e2:13:a3:be:c5:ca:65:49:6c:8f:ff:e8:16:e9:e4:43:
                    7e:3d:74:77:fb:7a:4a:b1:df:3d:42:04:72:5c:d2:78:
                    47:b3:4a:13:ff:de:b6:bc:f8:f3:e9:c1:b1:24:c9:1a:
                    be:5e:27:90:ed:49:a1:25:04:5b:74:3d:48:8e:00:cb
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        19:c2:82:43:f7:ae:69:a6:60:73:05:80:59:a0:cd:83:
        86:8d:02:d4:6d:9b:33:60:0c:3d:18:32:5c:b2:cc:22:
        bf:83:8d:fa:28:4c:7b:c6:05:6c:47:e3:3a:50:25:2b:
        c3:35:a7:9b:9e:a4:0a:bb:e9:d0:b0:01:b2:63:07:99:
        46:cc:1e:c2:04:17:da:f6:10:a1:24:b2:f1:92:94:5c:
        86:57:fa:11:f7:d7:65:da:4e:02:95:d0:cd:24:28:e3:
        46:cd:a0:27:73:ca:40:ac:58:74:5e:e2:b2:dc:e7:30:
        1d:20:23:1f:18:d9:4a:df:5c:b6:e8:41:eb:c7:ff:0d
    Fingerprint (MD5):
        E4:E0:8B:C2:D1:27:83:38:70:BC:C9:14:A6:37:4A:80
    Fingerprint (SHA1):
        72:CA:1C:96:DC:C5:D6:F8:87:9F:31:6F:C6:17:0A:E3:EF:54:DF:13

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #3406: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3407: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3408: Extension2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190688 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3409: Extension2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3410: Extension2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3411: Extension2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3412: Extension2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127190689   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3413: Extension2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #3414: Extension2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3415: Extension2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3416: Extension2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127190690   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3417: Extension2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #3418: Extension2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #3419: Extension2: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o User1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3420: Extension2: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1127190691   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3421: Extension2: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
chains.sh: #3422: Extension2: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #3423: Extension2: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o User2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3424: Extension2: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1127190692   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3425: Extension2: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
chains.sh: #3426: Extension2: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3427: Extension2: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190688 (0x432f90a0)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:10 2012
            Not After : Tue Nov 28 00:07:10 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e2:e1:bc:53:38:52:04:29:e7:1c:5e:f9:22:b6:59:ab:
                    fe:4b:35:27:3c:b1:02:36:f4:77:ec:7c:90:88:6e:e2:
                    46:49:40:d8:73:82:f6:40:67:60:6e:66:69:54:c3:b7:
                    ee:e6:91:81:f6:89:5c:04:a2:d5:5c:c8:4a:c9:60:16:
                    52:77:5e:ce:4b:58:8f:b1:53:30:90:21:1e:8b:f5:f9:
                    80:17:4b:53:03:38:c5:d3:02:c1:ad:ef:ed:f8:c0:27:
                    a2:5c:2b:eb:cf:95:f8:8a:bb:b4:7d:95:2d:44:d8:84:
                    01:e6:13:95:0a:0d:45:2d:a5:20:7c:09:9a:26:57:dd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        4a:2b:72:b2:c8:ce:e3:02:88:8c:63:17:2c:f3:5f:bd:
        f7:11:61:8a:54:ac:b8:c8:d0:0f:a0:39:17:94:25:9c:
        12:88:c4:ed:e5:84:9a:f5:a9:5f:a7:f7:21:60:73:ed:
        db:b9:b5:d3:be:03:dc:58:bc:14:31:04:5e:18:9b:d7:
        f6:60:be:46:db:e7:0e:92:ae:fb:36:ee:52:72:8f:30:
        b0:94:ce:4d:73:f0:68:1a:5b:a8:27:0e:a7:a3:19:1d:
        ed:37:ec:05:30:4a:c6:8d:96:b8:61:62:d6:5e:df:73:
        e4:46:89:6f:16:01:be:ad:de:d5:0b:ee:33:5c:a6:5e
    Fingerprint (MD5):
        23:E7:05:0F:1C:64:A8:EE:5B:DB:7E:F2:D1:57:8C:67
    Fingerprint (SHA1):
        7F:8F:FF:EA:33:6C:32:DD:E5:F7:8A:D3:7D:C9:D6:F7:4A:8A:7D:DD


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3428: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3429: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190689 (0x432f90a1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:11 2012
            Not After : Tue Nov 28 00:07:11 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ca:00:9a:db:74:d7:1b:75:f0:6f:7e:4d:5c:98:b7:f5:
                    f5:91:64:7f:5d:8d:d9:f5:8d:59:ed:bf:0c:c4:c5:16:
                    09:ee:68:39:80:c6:4a:0e:2d:28:11:11:fb:a6:76:b9:
                    55:82:6b:14:fb:13:e7:1e:a9:c9:a6:3b:e6:f3:18:8a:
                    6d:92:a4:b1:1f:10:35:03:ee:27:53:7e:fd:64:c1:7f:
                    f5:c2:be:5b:31:4a:de:a4:ed:e7:5e:1f:1c:51:04:64:
                    ec:52:68:06:a6:9d:92:20:63:d1:51:93:0e:45:ef:17:
                    00:2f:bd:b8:41:96:5d:f3:81:1c:77:a8:86:6a:43:bd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3a:b6:67:d6:13:78:32:05:8d:a2:cc:cb:18:38:8e:e9:
        94:69:40:d0:d5:74:6f:45:b6:2a:f3:bb:b5:8b:88:e8:
        fd:4c:89:ae:1e:dc:d1:b6:dc:80:ed:22:bf:7f:75:bf:
        85:10:24:9c:4d:eb:05:72:47:3c:86:8f:01:9a:fc:75:
        6f:72:55:e2:99:c4:27:11:48:79:a0:ba:12:8e:3d:b7:
        e9:1d:cc:e1:cc:34:48:5a:f1:6b:80:4c:32:b9:26:6c:
        82:96:97:1c:fe:45:c4:22:3d:21:36:a2:ac:d2:be:68:
        de:1e:cf:88:ea:5c:ab:7d:4f:fd:9e:4d:78:e7:b8:95
    Fingerprint (MD5):
        46:F1:D6:E5:BA:F1:C3:74:CC:07:2D:DC:EF:FB:19:14
    Fingerprint (SHA1):
        13:B4:9F:07:E0:5C:8F:72:A7:ED:46:83:E5:4A:FD:40:E0:68:3E:DE


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3430: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3431: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190690 (0x432f90a2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:11 2012
            Not After : Tue Nov 28 00:07:11 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f0:40:01:f9:59:63:e0:ae:75:b4:69:d4:aa:ca:ff:8c:
                    43:91:b9:c5:2e:ba:92:03:ed:e8:a0:44:2a:64:53:4c:
                    b9:67:83:72:cd:c7:0d:10:fe:e4:b1:67:37:50:8c:a5:
                    4e:92:ca:94:33:ee:45:67:0b:c2:f2:af:aa:66:11:43:
                    7f:f3:14:a7:f3:a7:2b:f3:4d:b2:fb:29:ed:85:af:3b:
                    f3:dc:ed:74:1e:d4:0a:87:27:43:d6:80:70:f5:cf:e8:
                    2f:ad:d0:79:65:14:ef:eb:db:4b:f2:d3:d2:d4:1e:06:
                    eb:0b:2a:9d:0b:73:98:19:14:72:de:8f:b1:41:10:f3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a6:f0:4f:7c:e8:00:9a:f9:30:8a:25:08:df:57:f2:87:
        42:53:85:19:a2:23:51:a4:de:b0:e6:cb:c2:a8:3f:ba:
        5b:02:0c:9f:d1:5b:67:66:e6:35:41:4d:c2:fe:00:5f:
        f4:1d:df:8e:c8:e1:e6:ac:b0:38:9b:fa:d7:71:b5:15:
        9a:79:6c:2f:c4:9e:7a:fb:4f:ce:ce:0b:80:73:07:61:
        f8:31:5c:b5:45:60:43:f3:64:26:1a:7b:fe:6d:94:0b:
        82:08:df:3a:ee:6d:a8:c7:d1:5c:93:b6:d5:bc:98:0f:
        f7:2f:06:0f:e5:9f:c8:92:11:59:c3:94:f7:53:f2:83
    Fingerprint (MD5):
        32:E2:4B:40:26:F2:36:88:E4:00:BB:07:93:0B:D6:AE
    Fingerprint (SHA1):
        20:21:56:5B:75:9F:A8:5C:19:88:59:32:64:C9:A9:CD:1B:E8:EA:1D


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3432: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3433: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3434: Extension2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #3435: Extension2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3436: Extension2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190688 (0x432f90a0)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:10 2012
            Not After : Tue Nov 28 00:07:10 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e2:e1:bc:53:38:52:04:29:e7:1c:5e:f9:22:b6:59:ab:
                    fe:4b:35:27:3c:b1:02:36:f4:77:ec:7c:90:88:6e:e2:
                    46:49:40:d8:73:82:f6:40:67:60:6e:66:69:54:c3:b7:
                    ee:e6:91:81:f6:89:5c:04:a2:d5:5c:c8:4a:c9:60:16:
                    52:77:5e:ce:4b:58:8f:b1:53:30:90:21:1e:8b:f5:f9:
                    80:17:4b:53:03:38:c5:d3:02:c1:ad:ef:ed:f8:c0:27:
                    a2:5c:2b:eb:cf:95:f8:8a:bb:b4:7d:95:2d:44:d8:84:
                    01:e6:13:95:0a:0d:45:2d:a5:20:7c:09:9a:26:57:dd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        4a:2b:72:b2:c8:ce:e3:02:88:8c:63:17:2c:f3:5f:bd:
        f7:11:61:8a:54:ac:b8:c8:d0:0f:a0:39:17:94:25:9c:
        12:88:c4:ed:e5:84:9a:f5:a9:5f:a7:f7:21:60:73:ed:
        db:b9:b5:d3:be:03:dc:58:bc:14:31:04:5e:18:9b:d7:
        f6:60:be:46:db:e7:0e:92:ae:fb:36:ee:52:72:8f:30:
        b0:94:ce:4d:73:f0:68:1a:5b:a8:27:0e:a7:a3:19:1d:
        ed:37:ec:05:30:4a:c6:8d:96:b8:61:62:d6:5e:df:73:
        e4:46:89:6f:16:01:be:ad:de:d5:0b:ee:33:5c:a6:5e
    Fingerprint (MD5):
        23:E7:05:0F:1C:64:A8:EE:5B:DB:7E:F2:D1:57:8C:67
    Fingerprint (SHA1):
        7F:8F:FF:EA:33:6C:32:DD:E5:F7:8A:D3:7D:C9:D6:F7:4A:8A:7D:DD

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3437: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3438: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190689 (0x432f90a1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:11 2012
            Not After : Tue Nov 28 00:07:11 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ca:00:9a:db:74:d7:1b:75:f0:6f:7e:4d:5c:98:b7:f5:
                    f5:91:64:7f:5d:8d:d9:f5:8d:59:ed:bf:0c:c4:c5:16:
                    09:ee:68:39:80:c6:4a:0e:2d:28:11:11:fb:a6:76:b9:
                    55:82:6b:14:fb:13:e7:1e:a9:c9:a6:3b:e6:f3:18:8a:
                    6d:92:a4:b1:1f:10:35:03:ee:27:53:7e:fd:64:c1:7f:
                    f5:c2:be:5b:31:4a:de:a4:ed:e7:5e:1f:1c:51:04:64:
                    ec:52:68:06:a6:9d:92:20:63:d1:51:93:0e:45:ef:17:
                    00:2f:bd:b8:41:96:5d:f3:81:1c:77:a8:86:6a:43:bd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3a:b6:67:d6:13:78:32:05:8d:a2:cc:cb:18:38:8e:e9:
        94:69:40:d0:d5:74:6f:45:b6:2a:f3:bb:b5:8b:88:e8:
        fd:4c:89:ae:1e:dc:d1:b6:dc:80:ed:22:bf:7f:75:bf:
        85:10:24:9c:4d:eb:05:72:47:3c:86:8f:01:9a:fc:75:
        6f:72:55:e2:99:c4:27:11:48:79:a0:ba:12:8e:3d:b7:
        e9:1d:cc:e1:cc:34:48:5a:f1:6b:80:4c:32:b9:26:6c:
        82:96:97:1c:fe:45:c4:22:3d:21:36:a2:ac:d2:be:68:
        de:1e:cf:88:ea:5c:ab:7d:4f:fd:9e:4d:78:e7:b8:95
    Fingerprint (MD5):
        46:F1:D6:E5:BA:F1:C3:74:CC:07:2D:DC:EF:FB:19:14
    Fingerprint (SHA1):
        13:B4:9F:07:E0:5C:8F:72:A7:ED:46:83:E5:4A:FD:40:E0:68:3E:DE

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3439: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3440: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190690 (0x432f90a2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:11 2012
            Not After : Tue Nov 28 00:07:11 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f0:40:01:f9:59:63:e0:ae:75:b4:69:d4:aa:ca:ff:8c:
                    43:91:b9:c5:2e:ba:92:03:ed:e8:a0:44:2a:64:53:4c:
                    b9:67:83:72:cd:c7:0d:10:fe:e4:b1:67:37:50:8c:a5:
                    4e:92:ca:94:33:ee:45:67:0b:c2:f2:af:aa:66:11:43:
                    7f:f3:14:a7:f3:a7:2b:f3:4d:b2:fb:29:ed:85:af:3b:
                    f3:dc:ed:74:1e:d4:0a:87:27:43:d6:80:70:f5:cf:e8:
                    2f:ad:d0:79:65:14:ef:eb:db:4b:f2:d3:d2:d4:1e:06:
                    eb:0b:2a:9d:0b:73:98:19:14:72:de:8f:b1:41:10:f3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a6:f0:4f:7c:e8:00:9a:f9:30:8a:25:08:df:57:f2:87:
        42:53:85:19:a2:23:51:a4:de:b0:e6:cb:c2:a8:3f:ba:
        5b:02:0c:9f:d1:5b:67:66:e6:35:41:4d:c2:fe:00:5f:
        f4:1d:df:8e:c8:e1:e6:ac:b0:38:9b:fa:d7:71:b5:15:
        9a:79:6c:2f:c4:9e:7a:fb:4f:ce:ce:0b:80:73:07:61:
        f8:31:5c:b5:45:60:43:f3:64:26:1a:7b:fe:6d:94:0b:
        82:08:df:3a:ee:6d:a8:c7:d1:5c:93:b6:d5:bc:98:0f:
        f7:2f:06:0f:e5:9f:c8:92:11:59:c3:94:f7:53:f2:83
    Fingerprint (MD5):
        32:E2:4B:40:26:F2:36:88:E4:00:BB:07:93:0B:D6:AE
    Fingerprint (SHA1):
        20:21:56:5B:75:9F:A8:5C:19:88:59:32:64:C9:A9:CD:1B:E8:EA:1D

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3441: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3442: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190688 (0x432f90a0)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:10 2012
            Not After : Tue Nov 28 00:07:10 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e2:e1:bc:53:38:52:04:29:e7:1c:5e:f9:22:b6:59:ab:
                    fe:4b:35:27:3c:b1:02:36:f4:77:ec:7c:90:88:6e:e2:
                    46:49:40:d8:73:82:f6:40:67:60:6e:66:69:54:c3:b7:
                    ee:e6:91:81:f6:89:5c:04:a2:d5:5c:c8:4a:c9:60:16:
                    52:77:5e:ce:4b:58:8f:b1:53:30:90:21:1e:8b:f5:f9:
                    80:17:4b:53:03:38:c5:d3:02:c1:ad:ef:ed:f8:c0:27:
                    a2:5c:2b:eb:cf:95:f8:8a:bb:b4:7d:95:2d:44:d8:84:
                    01:e6:13:95:0a:0d:45:2d:a5:20:7c:09:9a:26:57:dd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        4a:2b:72:b2:c8:ce:e3:02:88:8c:63:17:2c:f3:5f:bd:
        f7:11:61:8a:54:ac:b8:c8:d0:0f:a0:39:17:94:25:9c:
        12:88:c4:ed:e5:84:9a:f5:a9:5f:a7:f7:21:60:73:ed:
        db:b9:b5:d3:be:03:dc:58:bc:14:31:04:5e:18:9b:d7:
        f6:60:be:46:db:e7:0e:92:ae:fb:36:ee:52:72:8f:30:
        b0:94:ce:4d:73:f0:68:1a:5b:a8:27:0e:a7:a3:19:1d:
        ed:37:ec:05:30:4a:c6:8d:96:b8:61:62:d6:5e:df:73:
        e4:46:89:6f:16:01:be:ad:de:d5:0b:ee:33:5c:a6:5e
    Fingerprint (MD5):
        23:E7:05:0F:1C:64:A8:EE:5B:DB:7E:F2:D1:57:8C:67
    Fingerprint (SHA1):
        7F:8F:FF:EA:33:6C:32:DD:E5:F7:8A:D3:7D:C9:D6:F7:4A:8A:7D:DD

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3443: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190688 (0x432f90a0)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:10 2012
            Not After : Tue Nov 28 00:07:10 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e2:e1:bc:53:38:52:04:29:e7:1c:5e:f9:22:b6:59:ab:
                    fe:4b:35:27:3c:b1:02:36:f4:77:ec:7c:90:88:6e:e2:
                    46:49:40:d8:73:82:f6:40:67:60:6e:66:69:54:c3:b7:
                    ee:e6:91:81:f6:89:5c:04:a2:d5:5c:c8:4a:c9:60:16:
                    52:77:5e:ce:4b:58:8f:b1:53:30:90:21:1e:8b:f5:f9:
                    80:17:4b:53:03:38:c5:d3:02:c1:ad:ef:ed:f8:c0:27:
                    a2:5c:2b:eb:cf:95:f8:8a:bb:b4:7d:95:2d:44:d8:84:
                    01:e6:13:95:0a:0d:45:2d:a5:20:7c:09:9a:26:57:dd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        4a:2b:72:b2:c8:ce:e3:02:88:8c:63:17:2c:f3:5f:bd:
        f7:11:61:8a:54:ac:b8:c8:d0:0f:a0:39:17:94:25:9c:
        12:88:c4:ed:e5:84:9a:f5:a9:5f:a7:f7:21:60:73:ed:
        db:b9:b5:d3:be:03:dc:58:bc:14:31:04:5e:18:9b:d7:
        f6:60:be:46:db:e7:0e:92:ae:fb:36:ee:52:72:8f:30:
        b0:94:ce:4d:73:f0:68:1a:5b:a8:27:0e:a7:a3:19:1d:
        ed:37:ec:05:30:4a:c6:8d:96:b8:61:62:d6:5e:df:73:
        e4:46:89:6f:16:01:be:ad:de:d5:0b:ee:33:5c:a6:5e
    Fingerprint (MD5):
        23:E7:05:0F:1C:64:A8:EE:5B:DB:7E:F2:D1:57:8C:67
    Fingerprint (SHA1):
        7F:8F:FF:EA:33:6C:32:DD:E5:F7:8A:D3:7D:C9:D6:F7:4A:8A:7D:DD

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3444: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190689 (0x432f90a1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:11 2012
            Not After : Tue Nov 28 00:07:11 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ca:00:9a:db:74:d7:1b:75:f0:6f:7e:4d:5c:98:b7:f5:
                    f5:91:64:7f:5d:8d:d9:f5:8d:59:ed:bf:0c:c4:c5:16:
                    09:ee:68:39:80:c6:4a:0e:2d:28:11:11:fb:a6:76:b9:
                    55:82:6b:14:fb:13:e7:1e:a9:c9:a6:3b:e6:f3:18:8a:
                    6d:92:a4:b1:1f:10:35:03:ee:27:53:7e:fd:64:c1:7f:
                    f5:c2:be:5b:31:4a:de:a4:ed:e7:5e:1f:1c:51:04:64:
                    ec:52:68:06:a6:9d:92:20:63:d1:51:93:0e:45:ef:17:
                    00:2f:bd:b8:41:96:5d:f3:81:1c:77:a8:86:6a:43:bd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3a:b6:67:d6:13:78:32:05:8d:a2:cc:cb:18:38:8e:e9:
        94:69:40:d0:d5:74:6f:45:b6:2a:f3:bb:b5:8b:88:e8:
        fd:4c:89:ae:1e:dc:d1:b6:dc:80:ed:22:bf:7f:75:bf:
        85:10:24:9c:4d:eb:05:72:47:3c:86:8f:01:9a:fc:75:
        6f:72:55:e2:99:c4:27:11:48:79:a0:ba:12:8e:3d:b7:
        e9:1d:cc:e1:cc:34:48:5a:f1:6b:80:4c:32:b9:26:6c:
        82:96:97:1c:fe:45:c4:22:3d:21:36:a2:ac:d2:be:68:
        de:1e:cf:88:ea:5c:ab:7d:4f:fd:9e:4d:78:e7:b8:95
    Fingerprint (MD5):
        46:F1:D6:E5:BA:F1:C3:74:CC:07:2D:DC:EF:FB:19:14
    Fingerprint (SHA1):
        13:B4:9F:07:E0:5C:8F:72:A7:ED:46:83:E5:4A:FD:40:E0:68:3E:DE

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3445: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190689 (0x432f90a1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:11 2012
            Not After : Tue Nov 28 00:07:11 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ca:00:9a:db:74:d7:1b:75:f0:6f:7e:4d:5c:98:b7:f5:
                    f5:91:64:7f:5d:8d:d9:f5:8d:59:ed:bf:0c:c4:c5:16:
                    09:ee:68:39:80:c6:4a:0e:2d:28:11:11:fb:a6:76:b9:
                    55:82:6b:14:fb:13:e7:1e:a9:c9:a6:3b:e6:f3:18:8a:
                    6d:92:a4:b1:1f:10:35:03:ee:27:53:7e:fd:64:c1:7f:
                    f5:c2:be:5b:31:4a:de:a4:ed:e7:5e:1f:1c:51:04:64:
                    ec:52:68:06:a6:9d:92:20:63:d1:51:93:0e:45:ef:17:
                    00:2f:bd:b8:41:96:5d:f3:81:1c:77:a8:86:6a:43:bd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3a:b6:67:d6:13:78:32:05:8d:a2:cc:cb:18:38:8e:e9:
        94:69:40:d0:d5:74:6f:45:b6:2a:f3:bb:b5:8b:88:e8:
        fd:4c:89:ae:1e:dc:d1:b6:dc:80:ed:22:bf:7f:75:bf:
        85:10:24:9c:4d:eb:05:72:47:3c:86:8f:01:9a:fc:75:
        6f:72:55:e2:99:c4:27:11:48:79:a0:ba:12:8e:3d:b7:
        e9:1d:cc:e1:cc:34:48:5a:f1:6b:80:4c:32:b9:26:6c:
        82:96:97:1c:fe:45:c4:22:3d:21:36:a2:ac:d2:be:68:
        de:1e:cf:88:ea:5c:ab:7d:4f:fd:9e:4d:78:e7:b8:95
    Fingerprint (MD5):
        46:F1:D6:E5:BA:F1:C3:74:CC:07:2D:DC:EF:FB:19:14
    Fingerprint (SHA1):
        13:B4:9F:07:E0:5C:8F:72:A7:ED:46:83:E5:4A:FD:40:E0:68:3E:DE

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3446: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190690 (0x432f90a2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:11 2012
            Not After : Tue Nov 28 00:07:11 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f0:40:01:f9:59:63:e0:ae:75:b4:69:d4:aa:ca:ff:8c:
                    43:91:b9:c5:2e:ba:92:03:ed:e8:a0:44:2a:64:53:4c:
                    b9:67:83:72:cd:c7:0d:10:fe:e4:b1:67:37:50:8c:a5:
                    4e:92:ca:94:33:ee:45:67:0b:c2:f2:af:aa:66:11:43:
                    7f:f3:14:a7:f3:a7:2b:f3:4d:b2:fb:29:ed:85:af:3b:
                    f3:dc:ed:74:1e:d4:0a:87:27:43:d6:80:70:f5:cf:e8:
                    2f:ad:d0:79:65:14:ef:eb:db:4b:f2:d3:d2:d4:1e:06:
                    eb:0b:2a:9d:0b:73:98:19:14:72:de:8f:b1:41:10:f3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a6:f0:4f:7c:e8:00:9a:f9:30:8a:25:08:df:57:f2:87:
        42:53:85:19:a2:23:51:a4:de:b0:e6:cb:c2:a8:3f:ba:
        5b:02:0c:9f:d1:5b:67:66:e6:35:41:4d:c2:fe:00:5f:
        f4:1d:df:8e:c8:e1:e6:ac:b0:38:9b:fa:d7:71:b5:15:
        9a:79:6c:2f:c4:9e:7a:fb:4f:ce:ce:0b:80:73:07:61:
        f8:31:5c:b5:45:60:43:f3:64:26:1a:7b:fe:6d:94:0b:
        82:08:df:3a:ee:6d:a8:c7:d1:5c:93:b6:d5:bc:98:0f:
        f7:2f:06:0f:e5:9f:c8:92:11:59:c3:94:f7:53:f2:83
    Fingerprint (MD5):
        32:E2:4B:40:26:F2:36:88:E4:00:BB:07:93:0B:D6:AE
    Fingerprint (SHA1):
        20:21:56:5B:75:9F:A8:5C:19:88:59:32:64:C9:A9:CD:1B:E8:EA:1D

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3447: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190690 (0x432f90a2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:11 2012
            Not After : Tue Nov 28 00:07:11 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f0:40:01:f9:59:63:e0:ae:75:b4:69:d4:aa:ca:ff:8c:
                    43:91:b9:c5:2e:ba:92:03:ed:e8:a0:44:2a:64:53:4c:
                    b9:67:83:72:cd:c7:0d:10:fe:e4:b1:67:37:50:8c:a5:
                    4e:92:ca:94:33:ee:45:67:0b:c2:f2:af:aa:66:11:43:
                    7f:f3:14:a7:f3:a7:2b:f3:4d:b2:fb:29:ed:85:af:3b:
                    f3:dc:ed:74:1e:d4:0a:87:27:43:d6:80:70:f5:cf:e8:
                    2f:ad:d0:79:65:14:ef:eb:db:4b:f2:d3:d2:d4:1e:06:
                    eb:0b:2a:9d:0b:73:98:19:14:72:de:8f:b1:41:10:f3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a6:f0:4f:7c:e8:00:9a:f9:30:8a:25:08:df:57:f2:87:
        42:53:85:19:a2:23:51:a4:de:b0:e6:cb:c2:a8:3f:ba:
        5b:02:0c:9f:d1:5b:67:66:e6:35:41:4d:c2:fe:00:5f:
        f4:1d:df:8e:c8:e1:e6:ac:b0:38:9b:fa:d7:71:b5:15:
        9a:79:6c:2f:c4:9e:7a:fb:4f:ce:ce:0b:80:73:07:61:
        f8:31:5c:b5:45:60:43:f3:64:26:1a:7b:fe:6d:94:0b:
        82:08:df:3a:ee:6d:a8:c7:d1:5c:93:b6:d5:bc:98:0f:
        f7:2f:06:0f:e5:9f:c8:92:11:59:c3:94:f7:53:f2:83
    Fingerprint (MD5):
        32:E2:4B:40:26:F2:36:88:E4:00:BB:07:93:0B:D6:AE
    Fingerprint (SHA1):
        20:21:56:5B:75:9F:A8:5C:19:88:59:32:64:C9:A9:CD:1B:E8:EA:1D

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3448: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #3449: AnyPolicy: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190693 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3450: AnyPolicy: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #3451: AnyPolicy: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3452: AnyPolicy: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3453: AnyPolicy: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1127190694   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3454: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
chains.sh: #3455: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3456: AnyPolicy: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3457: AnyPolicy: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127190695   --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
0
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #3458: AnyPolicy: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #3459: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #3460: AnyPolicy: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3461: AnyPolicy: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1127190696   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3462: AnyPolicy: Creating certficate CA3CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA3CA1.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der
chains.sh: #3463: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #3464: AnyPolicy: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o User1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3465: AnyPolicy: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1127190697   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3466: AnyPolicy: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
chains.sh: #3467: AnyPolicy: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #3468: AnyPolicy: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o User2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3469: AnyPolicy: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1127190698   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3470: AnyPolicy: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
chains.sh: #3471: AnyPolicy: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB User3DB
certutil -N -d User3DB -f User3DB/dbpasswd
chains.sh: #3472: AnyPolicy: Creating DB User3DB  - PASSED
chains.sh: Creating EE certifiate request User3Req.der
certutil -s "CN=User3 EE, O=User3, C=US"  -R  -d User3DB -f User3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o User3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3473: AnyPolicy: Creating EE certifiate request User3Req.der  - PASSED
chains.sh: Creating certficate User3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1127190699   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3474: AnyPolicy: Creating certficate User3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate User3CA3.der to User3DB database
certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der
chains.sh: #3475: AnyPolicy: Importing certificate User3CA3.der to User3DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3476: AnyPolicy: Creating DB AllDB  - PASSED
chains.sh: Importing certificate RootCA.der to AllDB database
certutil -A -n RootCA  -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der
chains.sh: #3477: AnyPolicy: Importing certificate RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der
chains.sh: #3478: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3479: AnyPolicy: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA1.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der
chains.sh: #3480: AnyPolicy: Importing certificate CA3CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190693 (0x432f90a5)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:13 2012
            Not After : Tue Nov 28 00:07:13 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dc:1b:de:2c:75:5c:57:bb:56:f3:6a:46:0a:d1:23:92:
                    62:1f:5e:f8:a7:cf:5b:92:88:f8:25:6e:e7:3b:9f:f5:
                    32:0d:e4:ee:79:b6:25:0d:da:57:5c:4f:65:6a:28:50:
                    bd:e9:a4:8d:2c:c9:6a:bd:16:05:fa:dc:14:bd:2b:08:
                    49:34:0d:52:42:4a:42:df:7e:45:b3:08:b9:2d:d0:15:
                    51:77:6a:61:b7:db:d1:6e:03:c8:e0:4c:1a:36:1a:69:
                    ae:23:c5:0d:9c:65:bc:f0:67:53:15:26:91:be:34:ee:
                    eb:90:86:05:c3:10:43:56:01:0b:01:07:75:0b:56:c9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7a:9a:07:e9:5e:bb:37:c7:13:b2:aa:40:c8:5b:aa:0b:
        93:3f:ad:c5:b9:43:b8:88:41:d5:2e:12:b0:c9:3d:4b:
        b4:ed:9e:fa:4b:df:78:4f:40:8d:d2:2c:ce:dd:e6:7d:
        05:7c:e3:15:62:d5:c8:94:23:ff:39:da:79:52:86:c5:
        34:5b:50:8f:6d:52:1b:4f:f5:13:95:c8:8b:7b:52:b4:
        44:b1:df:55:a3:be:9b:47:92:21:be:db:c5:ff:69:aa:
        1a:7b:f2:a0:13:54:aa:5a:05:a6:d1:a7:0b:6a:9a:91:
        94:36:4a:49:cb:b7:8e:56:16:e2:d0:82:d2:cf:a6:0f
    Fingerprint (MD5):
        36:30:65:BA:D7:AC:7E:74:C2:7D:F1:88:9E:4F:00:87
    Fingerprint (SHA1):
        78:5E:88:72:75:07:76:96:3B:52:01:AD:69:7B:F4:2B:5D:02:E1:E8

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3481: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3482: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3483: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3484: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User3CA3.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190693 (0x432f90a5)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:13 2012
            Not After : Tue Nov 28 00:07:13 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    dc:1b:de:2c:75:5c:57:bb:56:f3:6a:46:0a:d1:23:92:
                    62:1f:5e:f8:a7:cf:5b:92:88:f8:25:6e:e7:3b:9f:f5:
                    32:0d:e4:ee:79:b6:25:0d:da:57:5c:4f:65:6a:28:50:
                    bd:e9:a4:8d:2c:c9:6a:bd:16:05:fa:dc:14:bd:2b:08:
                    49:34:0d:52:42:4a:42:df:7e:45:b3:08:b9:2d:d0:15:
                    51:77:6a:61:b7:db:d1:6e:03:c8:e0:4c:1a:36:1a:69:
                    ae:23:c5:0d:9c:65:bc:f0:67:53:15:26:91:be:34:ee:
                    eb:90:86:05:c3:10:43:56:01:0b:01:07:75:0b:56:c9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7a:9a:07:e9:5e:bb:37:c7:13:b2:aa:40:c8:5b:aa:0b:
        93:3f:ad:c5:b9:43:b8:88:41:d5:2e:12:b0:c9:3d:4b:
        b4:ed:9e:fa:4b:df:78:4f:40:8d:d2:2c:ce:dd:e6:7d:
        05:7c:e3:15:62:d5:c8:94:23:ff:39:da:79:52:86:c5:
        34:5b:50:8f:6d:52:1b:4f:f5:13:95:c8:8b:7b:52:b4:
        44:b1:df:55:a3:be:9b:47:92:21:be:db:c5:ff:69:aa:
        1a:7b:f2:a0:13:54:aa:5a:05:a6:d1:a7:0b:6a:9a:91:
        94:36:4a:49:cb:b7:8e:56:16:e2:d0:82:d2:cf:a6:0f
    Fingerprint (MD5):
        36:30:65:BA:D7:AC:7E:74:C2:7D:F1:88:9E:4F:00:87
    Fingerprint (SHA1):
        78:5E:88:72:75:07:76:96:3B:52:01:AD:69:7B:F4:2B:5D:02:E1:E8

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User3 EE,O=User3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3485: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User3CA3.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3486: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #3487: AnyPolicyWithLevel: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190700 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3488: AnyPolicyWithLevel: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #3489: AnyPolicyWithLevel: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3490: AnyPolicyWithLevel: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3491: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1127190701   --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #3492: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
chains.sh: #3493: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA12DB
certutil -N -d CA12DB -f CA12DB/dbpasswd
chains.sh: #3494: AnyPolicyWithLevel: Creating DB CA12DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA12Req.der
certutil -s "CN=CA12 Intermediate, O=CA12, C=US"  -R -2 -d CA12DB -f CA12DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA12Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3495: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der  - PASSED
chains.sh: Creating certficate CA12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1127190702   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3496: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA12CA1.der to CA12DB database
certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der
chains.sh: #3497: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database  - PASSED
chains.sh: Creating DB CA13DB
certutil -N -d CA13DB -f CA13DB/dbpasswd
chains.sh: #3498: AnyPolicyWithLevel: Creating DB CA13DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA13Req.der
certutil -s "CN=CA13 Intermediate, O=CA13, C=US"  -R -2 -d CA13DB -f CA13DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA13Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3499: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der  - PASSED
chains.sh: Creating certficate CA13CA12.der signed by CA12
certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1127190703   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3500: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12  - PASSED
chains.sh: Importing certificate CA13CA12.der to CA13DB database
certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der
chains.sh: #3501: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3502: AnyPolicyWithLevel: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3503: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA13.der signed by CA13
certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1127190704   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3504: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13  - PASSED
chains.sh: Importing certificate EE1CA13.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der
chains.sh: #3505: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database  - PASSED
chains.sh: Creating DB CA22DB
certutil -N -d CA22DB -f CA22DB/dbpasswd
chains.sh: #3506: AnyPolicyWithLevel: Creating DB CA22DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA22Req.der
certutil -s "CN=CA22 Intermediate, O=CA22, C=US"  -R -2 -d CA22DB -f CA22DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA22Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3507: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der  - PASSED
chains.sh: Creating certficate CA22CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1127190705   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3508: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA22CA1.der to CA22DB database
certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der
chains.sh: #3509: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database  - PASSED
chains.sh: Creating DB CA23DB
certutil -N -d CA23DB -f CA23DB/dbpasswd
chains.sh: #3510: AnyPolicyWithLevel: Creating DB CA23DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA23Req.der
certutil -s "CN=CA23 Intermediate, O=CA23, C=US"  -R -2 -d CA23DB -f CA23DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA23Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3511: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der  - PASSED
chains.sh: Creating certficate CA23CA22.der signed by CA22
certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1127190706   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3512: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22  - PASSED
chains.sh: Importing certificate CA23CA22.der to CA23DB database
certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der
chains.sh: #3513: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #3514: AnyPolicyWithLevel: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3515: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA23.der signed by CA23
certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1127190707   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3516: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23  - PASSED
chains.sh: Importing certificate EE2CA23.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der
chains.sh: #3517: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database  - PASSED
chains.sh: Creating DB CA32DB
certutil -N -d CA32DB -f CA32DB/dbpasswd
chains.sh: #3518: AnyPolicyWithLevel: Creating DB CA32DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA32Req.der
certutil -s "CN=CA32 Intermediate, O=CA32, C=US"  -R -2 -d CA32DB -f CA32DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA32Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3519: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der  - PASSED
chains.sh: Creating certficate CA32CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1127190708   --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #3520: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA32CA1.der to CA32DB database
certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der
chains.sh: #3521: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database  - PASSED
chains.sh: Creating DB CA33DB
certutil -N -d CA33DB -f CA33DB/dbpasswd
chains.sh: #3522: AnyPolicyWithLevel: Creating DB CA33DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA33Req.der
certutil -s "CN=CA33 Intermediate, O=CA33, C=US"  -R -2 -d CA33DB -f CA33DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA33Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3523: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der  - PASSED
chains.sh: Creating certficate CA33CA32.der signed by CA32
certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1127190709   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3524: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32  - PASSED
chains.sh: Importing certificate CA33CA32.der to CA33DB database
certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der
chains.sh: #3525: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #3526: AnyPolicyWithLevel: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US"  -R  -d EE3DB -f EE3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3527: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA33.der signed by CA33
certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1127190710   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3528: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33  - PASSED
chains.sh: Importing certificate EE3CA33.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der
chains.sh: #3529: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database  - PASSED
chains.sh: Creating DB CA42DB
certutil -N -d CA42DB -f CA42DB/dbpasswd
chains.sh: #3530: AnyPolicyWithLevel: Creating DB CA42DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA42Req.der
certutil -s "CN=CA42 Intermediate, O=CA42, C=US"  -R -2 -d CA42DB -f CA42DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA42Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3531: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der  - PASSED
chains.sh: Creating certficate CA42CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1127190711   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3532: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA42CA1.der to CA42DB database
certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der
chains.sh: #3533: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database  - PASSED
chains.sh: Creating DB CA43DB
certutil -N -d CA43DB -f CA43DB/dbpasswd
chains.sh: #3534: AnyPolicyWithLevel: Creating DB CA43DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA43Req.der
certutil -s "CN=CA43 Intermediate, O=CA43, C=US"  -R -2 -d CA43DB -f CA43DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA43Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3535: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der  - PASSED
chains.sh: Creating certficate CA43CA42.der signed by CA42
certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1127190712   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3536: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42  - PASSED
chains.sh: Importing certificate CA43CA42.der to CA43DB database
certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der
chains.sh: #3537: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #3538: AnyPolicyWithLevel: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US"  -R  -d EE4DB -f EE4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE4Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3539: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA43.der signed by CA43
certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1127190713   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3540: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43  - PASSED
chains.sh: Importing certificate EE4CA43.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der
chains.sh: #3541: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database  - PASSED
chains.sh: Creating DB CA52DB
certutil -N -d CA52DB -f CA52DB/dbpasswd
chains.sh: #3542: AnyPolicyWithLevel: Creating DB CA52DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA52Req.der
certutil -s "CN=CA52 Intermediate, O=CA52, C=US"  -R -2 -d CA52DB -f CA52DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA52Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3543: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der  - PASSED
chains.sh: Creating certficate CA52CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1127190714   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3544: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA52CA1.der to CA52DB database
certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der
chains.sh: #3545: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database  - PASSED
chains.sh: Creating DB CA53DB
certutil -N -d CA53DB -f CA53DB/dbpasswd
chains.sh: #3546: AnyPolicyWithLevel: Creating DB CA53DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA53Req.der
certutil -s "CN=CA53 Intermediate, O=CA53, C=US"  -R -2 -d CA53DB -f CA53DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA53Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3547: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der  - PASSED
chains.sh: Creating certficate CA53CA52.der signed by CA52
certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1127190715   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3548: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52  - PASSED
chains.sh: Importing certificate CA53CA52.der to CA53DB database
certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der
chains.sh: #3549: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database  - PASSED
chains.sh: Creating DB EE5DB
certutil -N -d EE5DB -f EE5DB/dbpasswd
chains.sh: #3550: AnyPolicyWithLevel: Creating DB EE5DB  - PASSED
chains.sh: Creating EE certifiate request EE5Req.der
certutil -s "CN=EE5 EE, O=EE5, C=US"  -R  -d EE5DB -f EE5DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE5Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3551: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der  - PASSED
chains.sh: Creating certficate EE5CA53.der signed by CA53
certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1127190716   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3552: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53  - PASSED
chains.sh: Importing certificate EE5CA53.der to EE5DB database
certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der
chains.sh: #3553: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database  - PASSED
chains.sh: Creating DB CA61DB
certutil -N -d CA61DB -f CA61DB/dbpasswd
chains.sh: #3554: AnyPolicyWithLevel: Creating DB CA61DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA61Req.der
certutil -s "CN=CA61 Intermediate, O=CA61, C=US"  -R -2 -d CA61DB -f CA61DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA61Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3555: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der  - PASSED
chains.sh: Creating certficate CA61RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1127190717   --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n
5
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #3556: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA61RootCA.der to CA61DB database
certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der
chains.sh: #3557: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database  - PASSED
chains.sh: Creating DB CA62DB
certutil -N -d CA62DB -f CA62DB/dbpasswd
chains.sh: #3558: AnyPolicyWithLevel: Creating DB CA62DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA62Req.der
certutil -s "CN=CA62 Intermediate, O=CA62, C=US"  -R -2 -d CA62DB -f CA62DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA62Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3559: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der  - PASSED
chains.sh: Creating certficate CA62CA61.der signed by CA61
certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1127190718   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3560: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61  - PASSED
chains.sh: Importing certificate CA62CA61.der to CA62DB database
certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der
chains.sh: #3561: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database  - PASSED
chains.sh: Creating DB EE62DB
certutil -N -d EE62DB -f EE62DB/dbpasswd
chains.sh: #3562: AnyPolicyWithLevel: Creating DB EE62DB  - PASSED
chains.sh: Creating EE certifiate request EE62Req.der
certutil -s "CN=EE62 EE, O=EE62, C=US"  -R  -d EE62DB -f EE62DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE62Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3563: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der  - PASSED
chains.sh: Creating certficate EE62CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1127190719   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3564: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate EE62CA62.der to EE62DB database
certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der
chains.sh: #3565: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database  - PASSED
chains.sh: Creating DB CA63DB
certutil -N -d CA63DB -f CA63DB/dbpasswd
chains.sh: #3566: AnyPolicyWithLevel: Creating DB CA63DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA63Req.der
certutil -s "CN=CA63 Intermediate, O=CA63, C=US"  -R -2 -d CA63DB -f CA63DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA63Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3567: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der  - PASSED
chains.sh: Creating certficate CA63CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1127190720   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3568: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate CA63CA62.der to CA63DB database
certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der
chains.sh: #3569: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database  - PASSED
chains.sh: Creating DB EE63DB
certutil -N -d EE63DB -f EE63DB/dbpasswd
chains.sh: #3570: AnyPolicyWithLevel: Creating DB EE63DB  - PASSED
chains.sh: Creating EE certifiate request EE63Req.der
certutil -s "CN=EE63 EE, O=EE63, C=US"  -R  -d EE63DB -f EE63DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE63Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3571: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der  - PASSED
chains.sh: Creating certficate EE63CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1127190721   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3572: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate EE63CA63.der to EE63DB database
certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der
chains.sh: #3573: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database  - PASSED
chains.sh: Creating DB CA64DB
certutil -N -d CA64DB -f CA64DB/dbpasswd
chains.sh: #3574: AnyPolicyWithLevel: Creating DB CA64DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA64Req.der
certutil -s "CN=CA64 Intermediate, O=CA64, C=US"  -R -2 -d CA64DB -f CA64DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA64Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3575: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der  - PASSED
chains.sh: Creating certficate CA64CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1127190722   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3576: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate CA64CA63.der to CA64DB database
certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der
chains.sh: #3577: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database  - PASSED
chains.sh: Creating DB EE64DB
certutil -N -d EE64DB -f EE64DB/dbpasswd
chains.sh: #3578: AnyPolicyWithLevel: Creating DB EE64DB  - PASSED
chains.sh: Creating EE certifiate request EE64Req.der
certutil -s "CN=EE64 EE, O=EE64, C=US"  -R  -d EE64DB -f EE64DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE64Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3579: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der  - PASSED
chains.sh: Creating certficate EE64CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1127190723   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3580: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate EE64CA64.der to EE64DB database
certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der
chains.sh: #3581: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database  - PASSED
chains.sh: Creating DB CA65DB
certutil -N -d CA65DB -f CA65DB/dbpasswd
chains.sh: #3582: AnyPolicyWithLevel: Creating DB CA65DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA65Req.der
certutil -s "CN=CA65 Intermediate, O=CA65, C=US"  -R -2 -d CA65DB -f CA65DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA65Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3583: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der  - PASSED
chains.sh: Creating certficate CA65CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1127190724   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3584: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate CA65CA64.der to CA65DB database
certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der
chains.sh: #3585: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database  - PASSED
chains.sh: Creating DB EE65DB
certutil -N -d EE65DB -f EE65DB/dbpasswd
chains.sh: #3586: AnyPolicyWithLevel: Creating DB EE65DB  - PASSED
chains.sh: Creating EE certifiate request EE65Req.der
certutil -s "CN=EE65 EE, O=EE65, C=US"  -R  -d EE65DB -f EE65DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE65Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3587: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der  - PASSED
chains.sh: Creating certficate EE65CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1127190725   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3588: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate EE65CA65.der to EE65DB database
certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der
chains.sh: #3589: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database  - PASSED
chains.sh: Creating DB CA66DB
certutil -N -d CA66DB -f CA66DB/dbpasswd
chains.sh: #3590: AnyPolicyWithLevel: Creating DB CA66DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA66Req.der
certutil -s "CN=CA66 Intermediate, O=CA66, C=US"  -R -2 -d CA66DB -f CA66DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA66Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3591: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der  - PASSED
chains.sh: Creating certficate CA66CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1127190726   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3592: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate CA66CA65.der to CA66DB database
certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der
chains.sh: #3593: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database  - PASSED
chains.sh: Creating DB EE66DB
certutil -N -d EE66DB -f EE66DB/dbpasswd
chains.sh: #3594: AnyPolicyWithLevel: Creating DB EE66DB  - PASSED
chains.sh: Creating EE certifiate request EE66Req.der
certutil -s "CN=EE66 EE, O=EE66, C=US"  -R  -d EE66DB -f EE66DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE66Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3595: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der  - PASSED
chains.sh: Creating certficate EE66CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1127190727   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3596: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate EE66CA66.der to EE66DB database
certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der
chains.sh: #3597: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database  - PASSED
chains.sh: Creating DB CA67DB
certutil -N -d CA67DB -f CA67DB/dbpasswd
chains.sh: #3598: AnyPolicyWithLevel: Creating DB CA67DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA67Req.der
certutil -s "CN=CA67 Intermediate, O=CA67, C=US"  -R -2 -d CA67DB -f CA67DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA67Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3599: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der  - PASSED
chains.sh: Creating certficate CA67CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1127190728   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3600: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate CA67CA66.der to CA67DB database
certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der
chains.sh: #3601: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database  - PASSED
chains.sh: Creating DB EE67DB
certutil -N -d EE67DB -f EE67DB/dbpasswd
chains.sh: #3602: AnyPolicyWithLevel: Creating DB EE67DB  - PASSED
chains.sh: Creating EE certifiate request EE67Req.der
certutil -s "CN=EE67 EE, O=EE67, C=US"  -R  -d EE67DB -f EE67DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE67Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3603: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der  - PASSED
chains.sh: Creating certficate EE67CA67.der signed by CA67
certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1127190729   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3604: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67  - PASSED
chains.sh: Importing certificate EE67CA67.der to EE67DB database
certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der
chains.sh: #3605: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3606: AnyPolicyWithLevel: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190700 (0x432f90ac)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:16 2012
            Not After : Tue Nov 28 00:07:16 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:42:a2:50:6c:ed:51:14:28:91:ff:88:04:0c:96:11:
                    a6:53:7a:78:b3:ad:0c:41:29:d8:35:4b:3d:9f:b0:a4:
                    bc:93:3e:d1:d6:24:ce:c8:b2:0f:14:91:70:93:4a:53:
                    94:93:f3:ed:b5:32:7b:24:91:7b:2f:da:74:19:89:c5:
                    09:49:1d:ff:c3:d1:ac:69:ab:94:60:4f:1f:c6:39:52:
                    ce:b4:b0:6d:50:79:0b:dc:94:d4:8c:11:aa:03:43:e2:
                    0d:5e:8f:3b:b4:4e:1b:19:53:31:74:c6:0b:e0:6e:16:
                    50:8a:75:71:8c:4c:cd:bd:bc:c8:fc:3f:74:5b:8e:6b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        89:50:6d:f0:20:5b:7f:0f:59:ba:dd:4e:90:21:93:db:
        23:93:a6:14:d4:94:a2:ab:1a:55:f7:e5:a2:23:c2:7e:
        74:cd:f1:9f:b4:5c:86:2e:1c:84:75:33:8c:a8:55:bc:
        b1:90:86:3e:d4:23:8e:6e:be:57:03:a5:b2:0a:8b:19:
        4c:d1:e4:e4:3d:31:e9:b8:45:cf:48:69:f4:5c:0f:a8:
        32:49:d4:a7:b0:48:39:81:01:5e:1c:b8:f7:67:8d:aa:
        c9:56:40:ad:f5:c2:32:08:54:e9:44:5e:5f:d5:57:50:
        15:ba:56:89:c8:e6:7f:6b:6c:ed:f7:d4:4a:cb:a0:cb
    Fingerprint (MD5):
        8A:BF:18:A5:B9:A4:D1:61:BA:62:13:6F:2B:87:5A:54
    Fingerprint (SHA1):
        48:1F:FA:D9:FA:26:5E:8C:05:91:00:E7:C5:EF:BA:31:6A:9E:5A:4D


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3607: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3608: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190700 (0x432f90ac)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:16 2012
            Not After : Tue Nov 28 00:07:16 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:42:a2:50:6c:ed:51:14:28:91:ff:88:04:0c:96:11:
                    a6:53:7a:78:b3:ad:0c:41:29:d8:35:4b:3d:9f:b0:a4:
                    bc:93:3e:d1:d6:24:ce:c8:b2:0f:14:91:70:93:4a:53:
                    94:93:f3:ed:b5:32:7b:24:91:7b:2f:da:74:19:89:c5:
                    09:49:1d:ff:c3:d1:ac:69:ab:94:60:4f:1f:c6:39:52:
                    ce:b4:b0:6d:50:79:0b:dc:94:d4:8c:11:aa:03:43:e2:
                    0d:5e:8f:3b:b4:4e:1b:19:53:31:74:c6:0b:e0:6e:16:
                    50:8a:75:71:8c:4c:cd:bd:bc:c8:fc:3f:74:5b:8e:6b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        89:50:6d:f0:20:5b:7f:0f:59:ba:dd:4e:90:21:93:db:
        23:93:a6:14:d4:94:a2:ab:1a:55:f7:e5:a2:23:c2:7e:
        74:cd:f1:9f:b4:5c:86:2e:1c:84:75:33:8c:a8:55:bc:
        b1:90:86:3e:d4:23:8e:6e:be:57:03:a5:b2:0a:8b:19:
        4c:d1:e4:e4:3d:31:e9:b8:45:cf:48:69:f4:5c:0f:a8:
        32:49:d4:a7:b0:48:39:81:01:5e:1c:b8:f7:67:8d:aa:
        c9:56:40:ad:f5:c2:32:08:54:e9:44:5e:5f:d5:57:50:
        15:ba:56:89:c8:e6:7f:6b:6c:ed:f7:d4:4a:cb:a0:cb
    Fingerprint (MD5):
        8A:BF:18:A5:B9:A4:D1:61:BA:62:13:6F:2B:87:5A:54
    Fingerprint (SHA1):
        48:1F:FA:D9:FA:26:5E:8C:05:91:00:E7:C5:EF:BA:31:6A:9E:5A:4D


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3609: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3610: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3611: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3612: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190700 (0x432f90ac)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:16 2012
            Not After : Tue Nov 28 00:07:16 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:42:a2:50:6c:ed:51:14:28:91:ff:88:04:0c:96:11:
                    a6:53:7a:78:b3:ad:0c:41:29:d8:35:4b:3d:9f:b0:a4:
                    bc:93:3e:d1:d6:24:ce:c8:b2:0f:14:91:70:93:4a:53:
                    94:93:f3:ed:b5:32:7b:24:91:7b:2f:da:74:19:89:c5:
                    09:49:1d:ff:c3:d1:ac:69:ab:94:60:4f:1f:c6:39:52:
                    ce:b4:b0:6d:50:79:0b:dc:94:d4:8c:11:aa:03:43:e2:
                    0d:5e:8f:3b:b4:4e:1b:19:53:31:74:c6:0b:e0:6e:16:
                    50:8a:75:71:8c:4c:cd:bd:bc:c8:fc:3f:74:5b:8e:6b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        89:50:6d:f0:20:5b:7f:0f:59:ba:dd:4e:90:21:93:db:
        23:93:a6:14:d4:94:a2:ab:1a:55:f7:e5:a2:23:c2:7e:
        74:cd:f1:9f:b4:5c:86:2e:1c:84:75:33:8c:a8:55:bc:
        b1:90:86:3e:d4:23:8e:6e:be:57:03:a5:b2:0a:8b:19:
        4c:d1:e4:e4:3d:31:e9:b8:45:cf:48:69:f4:5c:0f:a8:
        32:49:d4:a7:b0:48:39:81:01:5e:1c:b8:f7:67:8d:aa:
        c9:56:40:ad:f5:c2:32:08:54:e9:44:5e:5f:d5:57:50:
        15:ba:56:89:c8:e6:7f:6b:6c:ed:f7:d4:4a:cb:a0:cb
    Fingerprint (MD5):
        8A:BF:18:A5:B9:A4:D1:61:BA:62:13:6F:2B:87:5A:54
    Fingerprint (SHA1):
        48:1F:FA:D9:FA:26:5E:8C:05:91:00:E7:C5:EF:BA:31:6A:9E:5A:4D


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US"
Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3613: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3614: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3615: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3616: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190700 (0x432f90ac)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:16 2012
            Not After : Tue Nov 28 00:07:16 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:42:a2:50:6c:ed:51:14:28:91:ff:88:04:0c:96:11:
                    a6:53:7a:78:b3:ad:0c:41:29:d8:35:4b:3d:9f:b0:a4:
                    bc:93:3e:d1:d6:24:ce:c8:b2:0f:14:91:70:93:4a:53:
                    94:93:f3:ed:b5:32:7b:24:91:7b:2f:da:74:19:89:c5:
                    09:49:1d:ff:c3:d1:ac:69:ab:94:60:4f:1f:c6:39:52:
                    ce:b4:b0:6d:50:79:0b:dc:94:d4:8c:11:aa:03:43:e2:
                    0d:5e:8f:3b:b4:4e:1b:19:53:31:74:c6:0b:e0:6e:16:
                    50:8a:75:71:8c:4c:cd:bd:bc:c8:fc:3f:74:5b:8e:6b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        89:50:6d:f0:20:5b:7f:0f:59:ba:dd:4e:90:21:93:db:
        23:93:a6:14:d4:94:a2:ab:1a:55:f7:e5:a2:23:c2:7e:
        74:cd:f1:9f:b4:5c:86:2e:1c:84:75:33:8c:a8:55:bc:
        b1:90:86:3e:d4:23:8e:6e:be:57:03:a5:b2:0a:8b:19:
        4c:d1:e4:e4:3d:31:e9:b8:45:cf:48:69:f4:5c:0f:a8:
        32:49:d4:a7:b0:48:39:81:01:5e:1c:b8:f7:67:8d:aa:
        c9:56:40:ad:f5:c2:32:08:54:e9:44:5e:5f:d5:57:50:
        15:ba:56:89:c8:e6:7f:6b:6c:ed:f7:d4:4a:cb:a0:cb
    Fingerprint (MD5):
        8A:BF:18:A5:B9:A4:D1:61:BA:62:13:6F:2B:87:5A:54
    Fingerprint (SHA1):
        48:1F:FA:D9:FA:26:5E:8C:05:91:00:E7:C5:EF:BA:31:6A:9E:5A:4D


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US"
Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3617: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190700 (0x432f90ac)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:16 2012
            Not After : Tue Nov 28 00:07:16 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:42:a2:50:6c:ed:51:14:28:91:ff:88:04:0c:96:11:
                    a6:53:7a:78:b3:ad:0c:41:29:d8:35:4b:3d:9f:b0:a4:
                    bc:93:3e:d1:d6:24:ce:c8:b2:0f:14:91:70:93:4a:53:
                    94:93:f3:ed:b5:32:7b:24:91:7b:2f:da:74:19:89:c5:
                    09:49:1d:ff:c3:d1:ac:69:ab:94:60:4f:1f:c6:39:52:
                    ce:b4:b0:6d:50:79:0b:dc:94:d4:8c:11:aa:03:43:e2:
                    0d:5e:8f:3b:b4:4e:1b:19:53:31:74:c6:0b:e0:6e:16:
                    50:8a:75:71:8c:4c:cd:bd:bc:c8:fc:3f:74:5b:8e:6b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        89:50:6d:f0:20:5b:7f:0f:59:ba:dd:4e:90:21:93:db:
        23:93:a6:14:d4:94:a2:ab:1a:55:f7:e5:a2:23:c2:7e:
        74:cd:f1:9f:b4:5c:86:2e:1c:84:75:33:8c:a8:55:bc:
        b1:90:86:3e:d4:23:8e:6e:be:57:03:a5:b2:0a:8b:19:
        4c:d1:e4:e4:3d:31:e9:b8:45:cf:48:69:f4:5c:0f:a8:
        32:49:d4:a7:b0:48:39:81:01:5e:1c:b8:f7:67:8d:aa:
        c9:56:40:ad:f5:c2:32:08:54:e9:44:5e:5f:d5:57:50:
        15:ba:56:89:c8:e6:7f:6b:6c:ed:f7:d4:4a:cb:a0:cb
    Fingerprint (MD5):
        8A:BF:18:A5:B9:A4:D1:61:BA:62:13:6F:2B:87:5A:54
    Fingerprint (SHA1):
        48:1F:FA:D9:FA:26:5E:8C:05:91:00:E7:C5:EF:BA:31:6A:9E:5A:4D


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3618: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3619: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190700 (0x432f90ac)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:16 2012
            Not After : Tue Nov 28 00:07:16 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:42:a2:50:6c:ed:51:14:28:91:ff:88:04:0c:96:11:
                    a6:53:7a:78:b3:ad:0c:41:29:d8:35:4b:3d:9f:b0:a4:
                    bc:93:3e:d1:d6:24:ce:c8:b2:0f:14:91:70:93:4a:53:
                    94:93:f3:ed:b5:32:7b:24:91:7b:2f:da:74:19:89:c5:
                    09:49:1d:ff:c3:d1:ac:69:ab:94:60:4f:1f:c6:39:52:
                    ce:b4:b0:6d:50:79:0b:dc:94:d4:8c:11:aa:03:43:e2:
                    0d:5e:8f:3b:b4:4e:1b:19:53:31:74:c6:0b:e0:6e:16:
                    50:8a:75:71:8c:4c:cd:bd:bc:c8:fc:3f:74:5b:8e:6b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        89:50:6d:f0:20:5b:7f:0f:59:ba:dd:4e:90:21:93:db:
        23:93:a6:14:d4:94:a2:ab:1a:55:f7:e5:a2:23:c2:7e:
        74:cd:f1:9f:b4:5c:86:2e:1c:84:75:33:8c:a8:55:bc:
        b1:90:86:3e:d4:23:8e:6e:be:57:03:a5:b2:0a:8b:19:
        4c:d1:e4:e4:3d:31:e9:b8:45:cf:48:69:f4:5c:0f:a8:
        32:49:d4:a7:b0:48:39:81:01:5e:1c:b8:f7:67:8d:aa:
        c9:56:40:ad:f5:c2:32:08:54:e9:44:5e:5f:d5:57:50:
        15:ba:56:89:c8:e6:7f:6b:6c:ed:f7:d4:4a:cb:a0:cb
    Fingerprint (MD5):
        8A:BF:18:A5:B9:A4:D1:61:BA:62:13:6F:2B:87:5A:54
    Fingerprint (SHA1):
        48:1F:FA:D9:FA:26:5E:8C:05:91:00:E7:C5:EF:BA:31:6A:9E:5A:4D


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3620: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3621: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3622: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3623: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190700 (0x432f90ac)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:16 2012
            Not After : Tue Nov 28 00:07:16 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:42:a2:50:6c:ed:51:14:28:91:ff:88:04:0c:96:11:
                    a6:53:7a:78:b3:ad:0c:41:29:d8:35:4b:3d:9f:b0:a4:
                    bc:93:3e:d1:d6:24:ce:c8:b2:0f:14:91:70:93:4a:53:
                    94:93:f3:ed:b5:32:7b:24:91:7b:2f:da:74:19:89:c5:
                    09:49:1d:ff:c3:d1:ac:69:ab:94:60:4f:1f:c6:39:52:
                    ce:b4:b0:6d:50:79:0b:dc:94:d4:8c:11:aa:03:43:e2:
                    0d:5e:8f:3b:b4:4e:1b:19:53:31:74:c6:0b:e0:6e:16:
                    50:8a:75:71:8c:4c:cd:bd:bc:c8:fc:3f:74:5b:8e:6b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        89:50:6d:f0:20:5b:7f:0f:59:ba:dd:4e:90:21:93:db:
        23:93:a6:14:d4:94:a2:ab:1a:55:f7:e5:a2:23:c2:7e:
        74:cd:f1:9f:b4:5c:86:2e:1c:84:75:33:8c:a8:55:bc:
        b1:90:86:3e:d4:23:8e:6e:be:57:03:a5:b2:0a:8b:19:
        4c:d1:e4:e4:3d:31:e9:b8:45:cf:48:69:f4:5c:0f:a8:
        32:49:d4:a7:b0:48:39:81:01:5e:1c:b8:f7:67:8d:aa:
        c9:56:40:ad:f5:c2:32:08:54:e9:44:5e:5f:d5:57:50:
        15:ba:56:89:c8:e6:7f:6b:6c:ed:f7:d4:4a:cb:a0:cb
    Fingerprint (MD5):
        8A:BF:18:A5:B9:A4:D1:61:BA:62:13:6F:2B:87:5A:54
    Fingerprint (SHA1):
        48:1F:FA:D9:FA:26:5E:8C:05:91:00:E7:C5:EF:BA:31:6A:9E:5A:4D


Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US"
Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US"
Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3624: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190700 (0x432f90ac)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:16 2012
            Not After : Tue Nov 28 00:07:16 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:42:a2:50:6c:ed:51:14:28:91:ff:88:04:0c:96:11:
                    a6:53:7a:78:b3:ad:0c:41:29:d8:35:4b:3d:9f:b0:a4:
                    bc:93:3e:d1:d6:24:ce:c8:b2:0f:14:91:70:93:4a:53:
                    94:93:f3:ed:b5:32:7b:24:91:7b:2f:da:74:19:89:c5:
                    09:49:1d:ff:c3:d1:ac:69:ab:94:60:4f:1f:c6:39:52:
                    ce:b4:b0:6d:50:79:0b:dc:94:d4:8c:11:aa:03:43:e2:
                    0d:5e:8f:3b:b4:4e:1b:19:53:31:74:c6:0b:e0:6e:16:
                    50:8a:75:71:8c:4c:cd:bd:bc:c8:fc:3f:74:5b:8e:6b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        89:50:6d:f0:20:5b:7f:0f:59:ba:dd:4e:90:21:93:db:
        23:93:a6:14:d4:94:a2:ab:1a:55:f7:e5:a2:23:c2:7e:
        74:cd:f1:9f:b4:5c:86:2e:1c:84:75:33:8c:a8:55:bc:
        b1:90:86:3e:d4:23:8e:6e:be:57:03:a5:b2:0a:8b:19:
        4c:d1:e4:e4:3d:31:e9:b8:45:cf:48:69:f4:5c:0f:a8:
        32:49:d4:a7:b0:48:39:81:01:5e:1c:b8:f7:67:8d:aa:
        c9:56:40:ad:f5:c2:32:08:54:e9:44:5e:5f:d5:57:50:
        15:ba:56:89:c8:e6:7f:6b:6c:ed:f7:d4:4a:cb:a0:cb
    Fingerprint (MD5):
        8A:BF:18:A5:B9:A4:D1:61:BA:62:13:6F:2B:87:5A:54
    Fingerprint (SHA1):
        48:1F:FA:D9:FA:26:5E:8C:05:91:00:E7:C5:EF:BA:31:6A:9E:5A:4D


Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US"
Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #3625: AnyPolicyWithLevel: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190700 (0x432f90ac)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:16 2012
            Not After : Tue Nov 28 00:07:16 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:42:a2:50:6c:ed:51:14:28:91:ff:88:04:0c:96:11:
                    a6:53:7a:78:b3:ad:0c:41:29:d8:35:4b:3d:9f:b0:a4:
                    bc:93:3e:d1:d6:24:ce:c8:b2:0f:14:91:70:93:4a:53:
                    94:93:f3:ed:b5:32:7b:24:91:7b:2f:da:74:19:89:c5:
                    09:49:1d:ff:c3:d1:ac:69:ab:94:60:4f:1f:c6:39:52:
                    ce:b4:b0:6d:50:79:0b:dc:94:d4:8c:11:aa:03:43:e2:
                    0d:5e:8f:3b:b4:4e:1b:19:53:31:74:c6:0b:e0:6e:16:
                    50:8a:75:71:8c:4c:cd:bd:bc:c8:fc:3f:74:5b:8e:6b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        89:50:6d:f0:20:5b:7f:0f:59:ba:dd:4e:90:21:93:db:
        23:93:a6:14:d4:94:a2:ab:1a:55:f7:e5:a2:23:c2:7e:
        74:cd:f1:9f:b4:5c:86:2e:1c:84:75:33:8c:a8:55:bc:
        b1:90:86:3e:d4:23:8e:6e:be:57:03:a5:b2:0a:8b:19:
        4c:d1:e4:e4:3d:31:e9:b8:45:cf:48:69:f4:5c:0f:a8:
        32:49:d4:a7:b0:48:39:81:01:5e:1c:b8:f7:67:8d:aa:
        c9:56:40:ad:f5:c2:32:08:54:e9:44:5e:5f:d5:57:50:
        15:ba:56:89:c8:e6:7f:6b:6c:ed:f7:d4:4a:cb:a0:cb
    Fingerprint (MD5):
        8A:BF:18:A5:B9:A4:D1:61:BA:62:13:6F:2B:87:5A:54
    Fingerprint (SHA1):
        48:1F:FA:D9:FA:26:5E:8C:05:91:00:E7:C5:EF:BA:31:6A:9E:5A:4D


Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US"
Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #3626: AnyPolicyWithLevel: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190700 (0x432f90ac)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:16 2012
            Not After : Tue Nov 28 00:07:16 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:42:a2:50:6c:ed:51:14:28:91:ff:88:04:0c:96:11:
                    a6:53:7a:78:b3:ad:0c:41:29:d8:35:4b:3d:9f:b0:a4:
                    bc:93:3e:d1:d6:24:ce:c8:b2:0f:14:91:70:93:4a:53:
                    94:93:f3:ed:b5:32:7b:24:91:7b:2f:da:74:19:89:c5:
                    09:49:1d:ff:c3:d1:ac:69:ab:94:60:4f:1f:c6:39:52:
                    ce:b4:b0:6d:50:79:0b:dc:94:d4:8c:11:aa:03:43:e2:
                    0d:5e:8f:3b:b4:4e:1b:19:53:31:74:c6:0b:e0:6e:16:
                    50:8a:75:71:8c:4c:cd:bd:bc:c8:fc:3f:74:5b:8e:6b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        89:50:6d:f0:20:5b:7f:0f:59:ba:dd:4e:90:21:93:db:
        23:93:a6:14:d4:94:a2:ab:1a:55:f7:e5:a2:23:c2:7e:
        74:cd:f1:9f:b4:5c:86:2e:1c:84:75:33:8c:a8:55:bc:
        b1:90:86:3e:d4:23:8e:6e:be:57:03:a5:b2:0a:8b:19:
        4c:d1:e4:e4:3d:31:e9:b8:45:cf:48:69:f4:5c:0f:a8:
        32:49:d4:a7:b0:48:39:81:01:5e:1c:b8:f7:67:8d:aa:
        c9:56:40:ad:f5:c2:32:08:54:e9:44:5e:5f:d5:57:50:
        15:ba:56:89:c8:e6:7f:6b:6c:ed:f7:d4:4a:cb:a0:cb
    Fingerprint (MD5):
        8A:BF:18:A5:B9:A4:D1:61:BA:62:13:6F:2B:87:5A:54
    Fingerprint (SHA1):
        48:1F:FA:D9:FA:26:5E:8C:05:91:00:E7:C5:EF:BA:31:6A:9E:5A:4D


Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US"
Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #3627: AnyPolicyWithLevel: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190700 (0x432f90ac)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:16 2012
            Not After : Tue Nov 28 00:07:16 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:42:a2:50:6c:ed:51:14:28:91:ff:88:04:0c:96:11:
                    a6:53:7a:78:b3:ad:0c:41:29:d8:35:4b:3d:9f:b0:a4:
                    bc:93:3e:d1:d6:24:ce:c8:b2:0f:14:91:70:93:4a:53:
                    94:93:f3:ed:b5:32:7b:24:91:7b:2f:da:74:19:89:c5:
                    09:49:1d:ff:c3:d1:ac:69:ab:94:60:4f:1f:c6:39:52:
                    ce:b4:b0:6d:50:79:0b:dc:94:d4:8c:11:aa:03:43:e2:
                    0d:5e:8f:3b:b4:4e:1b:19:53:31:74:c6:0b:e0:6e:16:
                    50:8a:75:71:8c:4c:cd:bd:bc:c8:fc:3f:74:5b:8e:6b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        89:50:6d:f0:20:5b:7f:0f:59:ba:dd:4e:90:21:93:db:
        23:93:a6:14:d4:94:a2:ab:1a:55:f7:e5:a2:23:c2:7e:
        74:cd:f1:9f:b4:5c:86:2e:1c:84:75:33:8c:a8:55:bc:
        b1:90:86:3e:d4:23:8e:6e:be:57:03:a5:b2:0a:8b:19:
        4c:d1:e4:e4:3d:31:e9:b8:45:cf:48:69:f4:5c:0f:a8:
        32:49:d4:a7:b0:48:39:81:01:5e:1c:b8:f7:67:8d:aa:
        c9:56:40:ad:f5:c2:32:08:54:e9:44:5e:5f:d5:57:50:
        15:ba:56:89:c8:e6:7f:6b:6c:ed:f7:d4:4a:cb:a0:cb
    Fingerprint (MD5):
        8A:BF:18:A5:B9:A4:D1:61:BA:62:13:6F:2B:87:5A:54
    Fingerprint (SHA1):
        48:1F:FA:D9:FA:26:5E:8C:05:91:00:E7:C5:EF:BA:31:6A:9E:5A:4D


Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US"
Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #3628: AnyPolicyWithLevel: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190700 (0x432f90ac)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:16 2012
            Not After : Tue Nov 28 00:07:16 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:42:a2:50:6c:ed:51:14:28:91:ff:88:04:0c:96:11:
                    a6:53:7a:78:b3:ad:0c:41:29:d8:35:4b:3d:9f:b0:a4:
                    bc:93:3e:d1:d6:24:ce:c8:b2:0f:14:91:70:93:4a:53:
                    94:93:f3:ed:b5:32:7b:24:91:7b:2f:da:74:19:89:c5:
                    09:49:1d:ff:c3:d1:ac:69:ab:94:60:4f:1f:c6:39:52:
                    ce:b4:b0:6d:50:79:0b:dc:94:d4:8c:11:aa:03:43:e2:
                    0d:5e:8f:3b:b4:4e:1b:19:53:31:74:c6:0b:e0:6e:16:
                    50:8a:75:71:8c:4c:cd:bd:bc:c8:fc:3f:74:5b:8e:6b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        89:50:6d:f0:20:5b:7f:0f:59:ba:dd:4e:90:21:93:db:
        23:93:a6:14:d4:94:a2:ab:1a:55:f7:e5:a2:23:c2:7e:
        74:cd:f1:9f:b4:5c:86:2e:1c:84:75:33:8c:a8:55:bc:
        b1:90:86:3e:d4:23:8e:6e:be:57:03:a5:b2:0a:8b:19:
        4c:d1:e4:e4:3d:31:e9:b8:45:cf:48:69:f4:5c:0f:a8:
        32:49:d4:a7:b0:48:39:81:01:5e:1c:b8:f7:67:8d:aa:
        c9:56:40:ad:f5:c2:32:08:54:e9:44:5e:5f:d5:57:50:
        15:ba:56:89:c8:e6:7f:6b:6c:ed:f7:d4:4a:cb:a0:cb
    Fingerprint (MD5):
        8A:BF:18:A5:B9:A4:D1:61:BA:62:13:6F:2B:87:5A:54
    Fingerprint (SHA1):
        48:1F:FA:D9:FA:26:5E:8C:05:91:00:E7:C5:EF:BA:31:6A:9E:5A:4D


Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US"
Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US"
Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #3629: AnyPolicyWithLevel: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3630: AnyPolicyWithLevel: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3631: explicitPolicy: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190730 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3632: explicitPolicy: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3633: explicitPolicy: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB nonEVCADB
certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd
chains.sh: #3634: explicitPolicy: Creating DB nonEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request nonEVCAReq.der
certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US"  -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o nonEVCAReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3635: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der  - PASSED
chains.sh: Creating certficate nonEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1127190731   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3636: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database
certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der
chains.sh: #3637: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database  - PASSED
chains.sh: Creating DB EVCADB
certutil -N -d EVCADB -f EVCADB/dbpasswd
chains.sh: #3638: explicitPolicy: Creating DB EVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request EVCAReq.der
certutil -s "CN=EVCA Intermediate, O=EVCA, C=US"  -R -2 -d EVCADB -f EVCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EVCAReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3639: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der  - PASSED
chains.sh: Creating certficate EVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1127190732   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3640: explicitPolicy: Creating certficate EVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate EVCARoot.der to EVCADB database
certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der
chains.sh: #3641: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database  - PASSED
chains.sh: Creating DB otherEVCADB
certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd
chains.sh: #3642: explicitPolicy: Creating DB otherEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request otherEVCAReq.der
certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US"  -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o otherEVCAReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3643: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der  - PASSED
chains.sh: Creating certficate otherEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1127190733   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3644: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database
certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der
chains.sh: #3645: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database  - PASSED
chains.sh: Creating DB validEVDB
certutil -N -d validEVDB -f validEVDB/dbpasswd
chains.sh: #3646: explicitPolicy: Creating DB validEVDB  - PASSED
chains.sh: Creating EE certifiate request validEVReq.der
certutil -s "CN=validEV EE, O=validEV, C=US"  -R  -d validEVDB -f validEVDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o validEVReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3647: explicitPolicy: Creating EE certifiate request validEVReq.der  - PASSED
chains.sh: Creating certficate validEVEVCA.der signed by EVCA
certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1127190734   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3648: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA  - PASSED
chains.sh: Importing certificate validEVEVCA.der to validEVDB database
certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der
chains.sh: #3649: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database  - PASSED
chains.sh: Creating DB invalidEVDB
certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd
chains.sh: #3650: explicitPolicy: Creating DB invalidEVDB  - PASSED
chains.sh: Creating EE certifiate request invalidEVReq.der
certutil -s "CN=invalidEV EE, O=invalidEV, C=US"  -R  -d invalidEVDB -f invalidEVDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o invalidEVReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3651: explicitPolicy: Creating EE certifiate request invalidEVReq.der  - PASSED
chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA
certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1127190735   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3652: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA  - PASSED
chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database
certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der
chains.sh: #3653: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database  - PASSED
chains.sh: Creating DB wrongEVOIDDB
certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd
chains.sh: #3654: explicitPolicy: Creating DB wrongEVOIDDB  - PASSED
chains.sh: Creating EE certifiate request wrongEVOIDReq.der
certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US"  -R  -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o wrongEVOIDReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3655: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der  - PASSED
chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA
certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1127190736   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3656: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA  - PASSED
chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database
certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der
chains.sh: #3657: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3658: explicitPolicy: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  validEVEVCA.der EVCARoot.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190730 (0x432f90ca)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:27 2012
            Not After : Tue Nov 28 00:07:27 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:1e:05:8c:7b:55:2c:43:36:d3:ee:f9:1b:4b:79:33:
                    52:e6:6e:a5:a7:0f:eb:cb:80:3c:d9:11:07:84:00:b6:
                    71:8a:f1:ae:d6:c0:a2:9d:4f:ad:51:ef:bd:03:89:eb:
                    e5:45:7a:78:0a:92:d1:bd:85:9e:ee:ce:3d:65:6b:55:
                    99:76:32:ef:5a:7b:4d:da:5f:06:83:e9:d1:d6:a3:b3:
                    5d:d3:c3:7f:aa:5d:79:e0:6d:ba:d8:be:68:b9:6d:a8:
                    a5:63:03:e4:32:be:d9:0f:53:bd:10:d7:26:81:b8:b5:
                    d2:75:05:b5:94:06:9c:3a:c4:2f:f2:59:b2:fb:98:b5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        cb:a4:9f:42:a1:75:8f:58:0c:0e:6b:b6:d4:41:8a:ea:
        22:40:a9:d7:61:a5:bd:90:76:09:e5:3f:41:32:06:41:
        e8:e2:90:6e:fc:82:53:bc:62:71:61:ad:1b:3d:ab:e6:
        72:87:05:d7:84:56:1b:24:c4:f2:7a:9e:45:99:87:ba:
        c1:33:21:f7:6c:22:33:5f:eb:19:a6:c5:c5:93:b0:ce:
        52:f7:76:69:0b:90:48:20:d1:1d:fa:c1:66:09:72:f0:
        db:df:a5:9b:79:48:13:1b:2a:ef:cf:91:c4:c3:45:6e:
        3d:58:04:ff:b1:65:89:ab:f8:9c:88:a3:94:39:72:f0
    Fingerprint (MD5):
        2E:ED:50:8E:D8:7A:D1:C3:18:E7:5A:72:E7:16:85:7D
    Fingerprint (SHA1):
        BD:28:D0:86:EF:5A:BD:CE:6F:08:0F:57:22:29:54:3D:86:9B:61:E9


Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #3659: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3660: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3661: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3662: explicitPolicy: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  validEVEVCA.der EVCARoot.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190730 (0x432f90ca)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:27 2012
            Not After : Tue Nov 28 00:07:27 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:1e:05:8c:7b:55:2c:43:36:d3:ee:f9:1b:4b:79:33:
                    52:e6:6e:a5:a7:0f:eb:cb:80:3c:d9:11:07:84:00:b6:
                    71:8a:f1:ae:d6:c0:a2:9d:4f:ad:51:ef:bd:03:89:eb:
                    e5:45:7a:78:0a:92:d1:bd:85:9e:ee:ce:3d:65:6b:55:
                    99:76:32:ef:5a:7b:4d:da:5f:06:83:e9:d1:d6:a3:b3:
                    5d:d3:c3:7f:aa:5d:79:e0:6d:ba:d8:be:68:b9:6d:a8:
                    a5:63:03:e4:32:be:d9:0f:53:bd:10:d7:26:81:b8:b5:
                    d2:75:05:b5:94:06:9c:3a:c4:2f:f2:59:b2:fb:98:b5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        cb:a4:9f:42:a1:75:8f:58:0c:0e:6b:b6:d4:41:8a:ea:
        22:40:a9:d7:61:a5:bd:90:76:09:e5:3f:41:32:06:41:
        e8:e2:90:6e:fc:82:53:bc:62:71:61:ad:1b:3d:ab:e6:
        72:87:05:d7:84:56:1b:24:c4:f2:7a:9e:45:99:87:ba:
        c1:33:21:f7:6c:22:33:5f:eb:19:a6:c5:c5:93:b0:ce:
        52:f7:76:69:0b:90:48:20:d1:1d:fa:c1:66:09:72:f0:
        db:df:a5:9b:79:48:13:1b:2a:ef:cf:91:c4:c3:45:6e:
        3d:58:04:ff:b1:65:89:ab:f8:9c:88:a3:94:39:72:f0
    Fingerprint (MD5):
        2E:ED:50:8E:D8:7A:D1:C3:18:E7:5A:72:E7:16:85:7D
    Fingerprint (SHA1):
        BD:28:D0:86:EF:5A:BD:CE:6F:08:0F:57:22:29:54:3D:86:9B:61:E9

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #3663: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3664: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3665: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3666: Mapping: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190737 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3667: Mapping: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3668: Mapping: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3669: Mapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3670: Mapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127190738   --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #3671: Mapping: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #3672: Mapping: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3673: Mapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3674: Mapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127190739   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3675: Mapping: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #3676: Mapping: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #3677: Mapping: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3678: Mapping: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1127190740   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3679: Mapping: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #3680: Mapping: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3681: Mapping: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3682: Mapping: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #3683: Mapping: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3684: Mapping: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190737 (0x432f90d1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:30 2012
            Not After : Tue Nov 28 00:07:30 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    aa:4f:a1:ba:26:ca:5f:f2:e2:f3:81:65:ab:2f:06:6a:
                    f4:51:fa:40:64:49:73:75:52:f1:7e:b7:e5:c2:f9:c2:
                    e3:fe:47:3c:07:7e:b7:5d:04:6f:24:46:e4:2f:23:ef:
                    ab:10:e8:a1:5d:6e:a9:4f:7c:3c:ee:28:a2:34:39:5c:
                    bc:54:20:03:33:64:a8:33:85:2d:0a:ec:ed:28:e1:73:
                    eb:ca:3a:cd:79:3e:ac:0d:87:cd:8f:4d:f7:ac:b5:ae:
                    24:7b:48:16:f0:1d:68:5c:4d:80:ea:74:39:6d:6a:59:
                    ff:1a:c0:96:fa:e3:be:2b:ce:d6:2d:f0:91:87:6d:d7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8b:49:a2:b7:50:fc:56:e5:e0:e6:3d:54:36:eb:3e:28:
        4a:a4:f6:23:77:9b:a4:67:0e:07:66:d9:55:63:0b:d5:
        75:f2:4a:06:a6:3c:ff:2b:f5:29:1f:4b:8c:3d:77:5d:
        14:ac:4f:18:dc:50:2f:5d:dd:da:d2:01:0d:6b:d4:28:
        f1:c6:a0:9e:87:43:c7:d8:bf:57:5a:f7:bc:39:5e:a4:
        29:62:ec:45:82:08:ef:8a:00:cc:27:01:20:38:f0:41:
        b1:4c:6e:4a:9b:40:71:ce:e7:40:06:30:12:af:10:71:
        3d:ee:e0:c1:d1:fd:21:4d:51:ad:5b:6b:99:27:90:7d
    Fingerprint (MD5):
        76:27:92:50:FA:AC:64:D8:DC:96:16:64:8C:0C:AD:13
    Fingerprint (SHA1):
        F2:FF:8E:C3:BB:8D:52:06:59:83:9C:B3:A7:2F:72:E7:E4:E6:78:48

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3685: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3686: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3687: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190738 (0x432f90d2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:30 2012
            Not After : Tue Nov 28 00:07:30 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:fd:40:86:0f:b7:12:b3:75:57:5d:db:f0:0a:e5:19:
                    f8:4f:58:be:8a:8d:76:0a:46:24:08:86:24:89:0f:51:
                    bb:ec:3f:65:3c:8f:59:95:6a:e2:cd:7b:c1:d8:cd:8c:
                    38:d4:46:65:43:7c:c0:e9:71:18:fb:43:8d:67:db:9b:
                    74:d4:44:55:32:1f:e9:6f:a2:3d:ce:a1:fb:e7:c3:bb:
                    9c:95:a6:8b:45:7f:c2:10:82:a9:56:3e:b3:b4:42:e9:
                    9c:52:fe:b9:c8:81:75:c3:eb:bb:4d:1e:3a:92:81:76:
                    47:f9:d5:b6:ad:16:a2:1f:2d:e2:ad:84:8f:18:87:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:64:05:b5:65:d5:49:1a:89:97:0a:dd:b0:41:4a:7a:
        df:7a:38:49:f9:6b:55:c8:d1:f2:dd:56:88:52:78:b6:
        3e:96:af:9a:2e:3a:42:e9:06:4d:e8:de:64:49:50:d7:
        43:2b:11:62:28:a5:f1:4c:2b:93:90:62:02:05:a4:1d:
        e6:9c:a6:a9:01:a1:a2:57:41:a5:7f:13:0e:16:37:5e:
        4f:9d:1b:2f:5c:bb:3a:76:3f:d1:79:31:77:b2:e4:6d:
        d0:be:b9:22:89:81:9b:6c:95:f2:26:6d:3c:d5:43:cf:
        e0:97:a9:88:1a:80:29:29:ec:65:55:22:07:15:eb:49
    Fingerprint (MD5):
        BB:A2:9C:F0:D1:CB:D6:BC:06:B3:8A:7F:F4:32:DC:B1
    Fingerprint (SHA1):
        C1:96:56:7E:38:8B:E4:FF:C0:6F:0F:0F:B7:9B:06:6F:7D:FE:BB:49

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3688: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3689: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190739 (0x432f90d3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:31 2012
            Not After : Tue Nov 28 00:07:31 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ee:25:96:18:62:90:43:24:74:a0:9f:84:a9:d5:9c:90:
                    53:23:a5:e2:e8:55:ee:ed:ed:60:c3:2d:b9:8a:07:2f:
                    ad:d8:dd:2c:d6:d2:66:62:fc:94:ac:fb:b7:5e:c9:ad:
                    e3:0b:54:10:81:32:f8:41:d4:84:b5:37:c2:15:d8:9d:
                    d3:3e:16:a7:b3:c4:73:7d:c4:22:73:3b:1f:17:3e:bf:
                    52:5a:e6:c4:66:2c:44:a3:ad:3c:99:d4:8a:37:d8:81:
                    73:12:da:c9:dd:d1:dd:80:9a:06:7c:c7:fa:df:33:b8:
                    bd:8e:60:9f:23:31:1a:18:b5:28:d6:5b:f6:43:e1:e1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:65:9c:b9:9c:e8:a4:14:8e:d0:ba:27:8b:74:b8:a5:
        0c:02:fc:3d:a1:e7:cf:83:2b:c8:6d:20:90:9f:9f:f3:
        a8:17:2d:6d:7f:07:7a:4e:d3:d3:94:b5:9f:0c:a3:47:
        c4:ca:a1:6d:19:ef:97:3e:60:ca:02:bc:2f:06:db:af:
        01:2d:e6:a0:9f:2f:91:3f:3c:4f:c5:0a:ec:4e:fb:fe:
        d6:ad:a9:49:92:ad:4d:54:4c:d1:20:35:8e:6a:bb:6c:
        00:8a:be:d4:bc:d2:18:e7:07:58:93:ad:ae:df:28:e8:
        41:a8:d3:1b:8d:b6:31:f5:1a:c2:53:fc:28:1d:37:84
    Fingerprint (MD5):
        A5:FD:F5:B6:B1:86:3D:66:50:68:3F:A3:6B:08:71:07
    Fingerprint (SHA1):
        75:AE:94:51:A6:CD:39:AE:28:F7:8B:C4:9B:BF:F0:51:58:EC:D3:80

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #3690: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3691: Mapping2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190741 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3692: Mapping2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3693: Mapping2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3694: Mapping2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3695: Mapping2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127190742   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3696: Mapping2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #3697: Mapping2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3698: Mapping2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3699: Mapping2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127190743   --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #3700: Mapping2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #3701: Mapping2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #3702: Mapping2: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3703: Mapping2: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1127190744   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3704: Mapping2: Creating certficate CA3CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate CA3CA2.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der
chains.sh: #3705: Mapping2: Importing certificate CA3CA2.der to CA3DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #3706: Mapping2: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3707: Mapping2: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1127190745   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3708: Mapping2: Creating certficate UserCA3.der signed by CA3  - PASSED
chains.sh: Importing certificate UserCA3.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der
chains.sh: #3709: Mapping2: Importing certificate UserCA3.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3710: Mapping2: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3711: Mapping2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #3712: Mapping2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #3713: Mapping2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA2.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der
chains.sh: #3714: Mapping2: Importing certificate CA3CA2.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190741 (0x432f90d5)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:32 2012
            Not After : Tue Nov 28 00:07:32 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ef:1f:6b:16:a1:1c:fd:5b:d4:00:9b:37:52:73:67:c3:
                    13:d9:51:93:67:4d:76:4a:9a:78:37:af:83:74:91:de:
                    e6:df:18:af:52:dd:08:d2:08:35:3b:d4:cc:21:4a:e6:
                    c9:c3:b1:17:f3:aa:3a:63:51:6f:63:c1:25:c5:72:ca:
                    03:05:e5:9f:c0:01:eb:e9:b6:b1:12:d2:0e:cb:7c:13:
                    3b:d8:e3:67:88:28:40:44:8f:3a:af:9e:36:3b:2d:21:
                    cb:ba:16:06:ce:ce:d1:76:fe:18:33:fb:e3:e6:bc:4a:
                    a2:ad:11:85:cb:be:fc:fd:df:27:1b:a3:34:55:fc:a7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        d3:c9:9d:d0:1d:4a:1b:a5:5b:a4:22:89:63:81:f2:02:
        55:fc:48:43:19:e4:5e:23:be:c1:4f:88:93:73:4a:2d:
        d6:5b:84:09:c1:f4:fb:7a:ab:72:77:a4:c1:a6:13:46:
        60:d0:b7:20:8e:26:58:b9:1b:81:79:26:2b:d0:ec:39:
        94:58:d5:21:ca:f6:f1:d8:57:a7:6c:61:5f:4a:04:91:
        83:77:1d:07:80:a5:ab:72:d2:3d:80:b1:99:f8:99:85:
        20:00:53:84:2d:1d:a2:0e:fd:db:0a:52:6a:af:57:c7:
        13:91:f5:58:84:fc:8c:6e:4e:f4:e0:74:9a:cf:13:c8
    Fingerprint (MD5):
        EB:73:5B:A6:C4:69:ED:E8:FE:3D:81:29:37:93:77:D3
    Fingerprint (SHA1):
        9D:7C:06:9E:14:87:FA:B5:78:1A:A3:97:A7:C5:5E:14:FF:BC:7F:20

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3715: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3716: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190742 (0x432f90d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:32 2012
            Not After : Tue Nov 28 00:07:32 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bc:c2:b5:e3:f9:ed:b1:f5:b8:33:79:b9:a3:2a:e2:c5:
                    a5:ff:6d:8f:a3:4f:7c:8a:7d:88:a2:27:bd:fa:3d:8d:
                    e6:17:6d:f8:0a:d7:3d:7b:08:b4:9d:85:a4:88:67:63:
                    c3:21:f8:bf:76:61:7b:b7:11:4b:b4:77:9b:69:1d:08:
                    f3:2d:a6:c2:8a:47:e8:12:08:33:8f:0e:cb:36:ab:f8:
                    18:63:01:7e:92:96:9f:7f:fc:b3:35:fc:0a:f3:bd:1f:
                    c2:04:2c:38:39:43:10:4b:35:cf:c6:80:4c:61:36:c8:
                    fd:26:e2:52:c3:cb:78:fd:d6:35:9d:2e:bb:96:be:a3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        e3:d3:f1:fc:76:62:b5:41:fd:67:b4:63:15:c1:74:29:
        bb:51:bd:f5:0f:76:5d:7c:cd:a1:dc:48:74:26:ea:40:
        1b:93:ef:26:89:e6:18:bd:d0:9f:87:3d:22:b0:07:f2:
        fd:01:33:4f:f0:d3:9a:da:73:ab:e2:2a:54:7a:3f:5b:
        1f:0e:f7:b2:08:71:f9:30:6f:de:eb:81:6b:ba:37:3b:
        8a:03:5f:15:ce:50:14:08:17:1d:38:c4:31:e9:f1:e7:
        36:c1:e4:ff:1e:65:d9:3d:0a:3a:08:76:b6:0b:25:fc:
        a8:d4:23:16:e9:bb:64:dd:a1:ae:de:e8:fd:b9:c4:85
    Fingerprint (MD5):
        7E:D9:96:F1:6E:14:AC:7C:9F:E6:96:C6:57:1B:04:54
    Fingerprint (SHA1):
        1E:21:03:1E:37:2B:9C:A8:30:B0:76:8C:8D:C9:9B:12:73:97:9D:4E

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3717: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3718: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3719: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190743 (0x432f90d7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:32 2012
            Not After : Tue Nov 28 00:07:32 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:39:c7:c9:8c:f3:61:23:59:1a:2f:0c:eb:11:ab:2d:
                    38:5f:25:b5:d3:41:e0:29:65:c9:c3:43:0b:ca:76:3a:
                    73:75:12:36:c3:cd:7a:97:1e:76:c8:60:5c:6e:1c:55:
                    25:e6:61:3e:34:02:77:55:27:8b:75:bc:ee:cb:c9:6a:
                    cf:0b:c9:3f:ce:6a:bf:18:6b:a5:f6:cb:e3:2b:74:d1:
                    c0:33:e7:64:c0:f9:cd:90:72:66:4f:44:8b:34:61:a0:
                    b1:bf:63:4e:e8:3a:8a:f5:e8:99:ec:ab:55:11:f1:18:
                    81:bb:b0:3b:40:b1:7f:b5:98:f0:f7:0e:ca:28:d2:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0c:da:b8:ba:72:80:92:9b:fe:71:c5:5e:83:52:8c:c6:
        f0:4a:79:98:3b:84:c5:07:f6:44:05:27:f2:04:9d:91:
        b6:be:98:d1:03:4e:39:66:6c:f5:a7:0b:20:2e:54:eb:
        29:39:81:a5:c8:75:d2:69:38:13:e2:b2:64:3d:a9:b5:
        19:d8:2f:7b:ed:8e:51:d0:0f:62:2d:28:64:61:aa:6d:
        fe:45:f0:64:00:dd:74:da:65:43:02:4a:2d:2d:4b:b4:
        0c:87:29:e0:54:2a:73:cf:ec:27:a1:38:03:76:7b:9b:
        f8:24:01:54:1a:23:3b:ea:f8:1b:0d:2d:6a:ba:cf:a3
    Fingerprint (MD5):
        A1:28:CC:F4:50:05:F7:F6:60:6C:C1:31:C9:48:2F:D6
    Fingerprint (SHA1):
        3F:A8:EB:5D:C9:30:69:60:52:8A:E4:6D:47:B5:56:8A:04:87:BA:56

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #3720: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3721: AIA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190746 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3722: AIA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3723: AIA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3724: AIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3725: AIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127190747   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3726: AIA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #3727: AIA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3728: AIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3729: AIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127190748   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA1Root-1127190656.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3730: AIA: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #3731: AIA: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #3732: AIA: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3733: AIA: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1127190749   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3734: AIA: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #3735: AIA: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB     -t Root.der
vfychain -d UserDB -pp -vv      UserCA2.der CA2CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA1 Intermediate,O=CA1,C=US
Returned value is 1, expected result is fail
chains.sh: #3736: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB -f    -t Root.der
vfychain -d UserDB -pp -vv  -f    UserCA2.der CA2CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #3737: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB -f    -t Root.der - FAILED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #3738: BridgeWithAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190750 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3739: BridgeWithAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #3740: BridgeWithAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #3741: BridgeWithAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190751 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3742: BridgeWithAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #3743: BridgeWithAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #3744: BridgeWithAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o BridgeReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3745: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1127190752 -7 Bridge@Army  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3746: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #3747: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1127190753 -7 Bridge@Navy  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3748: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #3749: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #3750: BridgeWithAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3751: BridgeWithAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3752: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1127190754   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-Bridge-1127190657.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3753: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #3754: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3755: BridgeWithAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3756: BridgeWithAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127190755   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3757: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #3758: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #3759: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is fail
chains.sh: #3760: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #3761: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der - FAILED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@army [Certificate Authority]:
Email Address(es): bridge@army
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Army ROOT CA,O=Army,C=US
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #3762: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - FAILED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #3763: BridgeWithHalfAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190756 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3764: BridgeWithHalfAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #3765: BridgeWithHalfAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #3766: BridgeWithHalfAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190757 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3767: BridgeWithHalfAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #3768: BridgeWithHalfAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #3769: BridgeWithHalfAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o BridgeReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3770: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1127190758 -7 Bridge@Army  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3771: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #3772: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1127190759 -7 Bridge@Navy  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3773: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #3774: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #3775: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3776: BridgeWithHalfAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3777: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1127190760   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-Bridge-1127190658.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3778: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #3779: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3780: BridgeWithHalfAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3781: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127190761   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3782: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #3783: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3784: BridgeWithHalfAIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3785: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1127190762   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-BridgeNavy-1127190659.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3786: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
chains.sh: #3787: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #3788: BridgeWithHalfAIA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3789: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1127190763   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3790: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #3791: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #3792: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is fail
chains.sh: #3793: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #3794: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der - FAILED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@army [Certificate Authority]:
Email Address(es): bridge@army
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Army ROOT CA,O=Army,C=US
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #3795: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - FAILED
chains.sh: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der BridgeArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=EE2 EE,O=EE2,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA2 Intermediate,O=CA2,C=US
Returned value is 1, expected result is fail
chains.sh: #3796: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190756 (0x432f90e4)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 00:07:47 2012
            Not After : Tue Nov 28 00:07:47 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a8:3e:48:54:f1:33:0b:68:c9:d5:e9:a0:bf:fb:1c:0c:
                    14:8b:58:9a:eb:9c:ea:13:ba:ee:a1:94:80:a8:29:e3:
                    57:0a:91:7c:89:73:79:65:60:eb:c2:00:d6:41:5a:be:
                    b6:73:79:ca:a1:3b:26:63:58:40:09:31:cb:7a:92:07:
                    8f:fe:6c:c6:2b:07:68:a8:bc:d0:eb:2c:2e:90:5c:6f:
                    c8:5e:4a:a6:58:bb:e2:ec:6f:a0:b2:05:bd:9e:32:e5:
                    fc:8a:9d:43:4b:d1:9e:6b:2c:f8:14:ab:4e:5e:4f:3e:
                    22:09:ca:da:ea:4b:20:24:88:86:f5:6c:2f:d0:d0:55
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7a:3c:c7:c7:93:68:6e:d6:c8:67:3e:60:9b:4f:04:b9:
        c1:b6:a1:12:6d:13:82:80:0d:d8:8f:24:2d:6d:86:fa:
        4b:8a:ff:9b:cb:b7:ce:70:9f:39:4c:58:14:3c:fc:98:
        1b:dc:ee:61:9b:66:9f:fb:0e:2d:d4:b8:a2:f3:66:bc:
        10:3c:ae:da:98:74:d6:ea:66:c7:92:56:89:55:e0:41:
        a8:87:23:7b:8c:53:59:57:df:10:c3:ad:d6:b3:05:3d:
        3e:d5:71:97:54:fb:7d:9d:39:73:72:56:62:91:a9:8d:
        58:4c:17:f5:4f:83:93:68:93:25:df:7b:20:e4:65:d6
    Fingerprint (MD5):
        A3:51:A1:41:BA:45:DF:BE:6F:24:B7:EA:4E:23:AB:BA
    Fingerprint (SHA1):
        5F:22:76:12:EB:8A:C1:CA:4E:A1:FB:C1:A5:C0:D4:28:F9:AA:87:CE


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #3797: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #3798: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags  -d EE1DB -f    -t Navy.der - FAILED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@army [Certificate Authority]:
Email Address(es): bridge@army
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Army ROOT CA,O=Army,C=US
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #3799: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - FAILED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #3800: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190764 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3801: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #3802: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #3803: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190765 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3804: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #3805: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB CAArmyDB
certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd
chains.sh: #3806: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CAArmyReq.der
certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US"  -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CAArmyReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3807: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der  - PASSED
chains.sh: Creating certficate CAArmyArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1127190766   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3808: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army  - PASSED
chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database
certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der
chains.sh: #3809: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database  - PASSED
chains.sh: Creating DB CANavyDB
certutil -N -d CANavyDB -f CANavyDB/dbpasswd
chains.sh: #3810: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CANavyReq.der
certutil -s "CN=CANavy Intermediate, O=CANavy, C=US"  -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CANavyReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3811: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der  - PASSED
chains.sh: Creating certficate CANavyNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1127190767   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3812: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate CANavyNavy.der to CANavyDB database
certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der
chains.sh: #3813: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #3814: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o BridgeReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3815: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy
certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1127190768 -7 Bridge@CAArmy  --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n
OID.1.1
OID.2.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #3816: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy  - PASSED
chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der
chains.sh: #3817: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeCANavy.der signed by CANavy
certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1127190769 -7 Bridge@CANavy  --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n
OID.2.1
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #3818: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy  - PASSED
chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der
chains.sh: #3819: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7
chains.sh: #3820: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3821: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3822: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1127190770   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.1
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3823: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #3824: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3825: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3826: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1127190771   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3827: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
chains.sh: #3828: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3829: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3830: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127190772   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3831: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #3832: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #3833: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3834: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1127190773   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3835: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #3836: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der
vfychain  -pp -vv     -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3837: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der
vfychain  -pp -vv     -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190764 (0x432f90ec)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 00:08:02 2012
            Not After : Tue Nov 28 00:08:02 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9e:82:0d:1f:84:5d:52:ea:bf:19:34:4d:36:eb:59:29:
                    7a:f4:2e:af:03:fb:14:af:b4:be:c3:a4:c1:50:96:db:
                    b1:0a:d1:49:6f:e7:8f:ff:2f:0a:b7:a2:45:f0:38:7a:
                    37:6c:41:fd:39:46:af:85:66:d9:28:6b:f6:3c:b0:93:
                    db:44:8c:5a:b9:17:c5:ae:27:63:c6:2a:a5:81:6d:72:
                    44:f3:9a:7c:fa:89:e9:23:11:4e:30:7d:bb:7b:00:58:
                    72:8f:86:dd:f6:74:22:80:bb:18:e7:dc:56:b1:5f:e2:
                    27:fb:64:06:5b:c4:20:85:3f:f0:65:0f:9c:45:56:13
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        47:5a:42:46:d0:54:08:6e:90:20:af:82:99:c7:55:29:
        b3:dc:11:92:6b:24:3f:13:65:d1:bc:5c:9b:cc:07:f7:
        8a:51:ee:cf:f7:28:8a:87:d1:f6:16:e1:40:38:a6:28:
        18:51:92:26:56:73:82:31:60:7e:4c:5b:0d:07:0d:82:
        26:fc:d5:28:b9:81:e5:a5:a4:c5:a2:97:fc:13:65:08:
        29:15:1e:e2:4a:3e:62:3a:20:ed:ba:1f:1e:ce:4d:1d:
        ba:20:80:30:a5:33:a2:3a:eb:9e:5d:9a:68:97:6e:03:
        39:4d:81:a7:f9:d9:c1:1d:c7:0b:5e:29:24:22:03:d0
    Fingerprint (MD5):
        45:E8:9D:FE:BB:D7:B2:AF:36:73:DF:BC:CC:8E:83:23
    Fingerprint (SHA1):
        2E:43:8D:7C:9A:BB:CD:19:B5:FD:1C:D0:DB:A4:BF:8F:E0:54:E1:C7


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US"
Returned value is 0, expected result is pass
chains.sh: #3838: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der
vfychain  -pp -vv     -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3839: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der
vfychain  -pp -vv     -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3840: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der
vfychain  -pp -vv     -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3841: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der
vfychain  -pp -vv     -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3842: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der
vfychain  -pp -vv     -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3843: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der
vfychain  -pp -vv     -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3844: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der
vfychain  -pp -vv     -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3845: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der
vfychain  -pp -vv     -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3846: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der
vfychain  -pp -vv     -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190765 (0x432f90ed)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:08:03 2012
            Not After : Tue Nov 28 00:08:03 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:74:a1:35:54:a0:28:b4:cb:c2:1a:d6:d1:4b:cb:9b:
                    6d:fa:24:8c:3d:4b:17:89:83:bf:ef:e8:79:89:76:e2:
                    be:42:41:ba:c3:3a:bb:bb:1b:28:f7:d9:d5:d0:01:30:
                    f8:fa:c6:10:13:5f:1c:48:e1:00:9e:af:b4:5d:1f:e0:
                    16:4a:48:c8:b0:95:05:45:34:f3:af:2e:06:9b:1c:cc:
                    b0:99:5f:88:3c:3f:b4:53:30:e3:df:b6:ed:40:cc:12:
                    32:6d:6e:79:28:24:2f:f8:42:fa:1a:ab:17:70:9d:87:
                    25:81:6d:4b:2c:4c:45:b5:e0:7c:09:fd:aa:57:53:37
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a1:ee:b8:f5:d6:aa:d6:39:19:16:4a:a0:0d:2b:10:8b:
        22:ba:16:7f:ea:00:62:bf:64:dc:33:48:19:0d:51:34:
        47:9b:82:f6:ae:75:46:72:b3:70:a6:e9:ed:de:4a:d7:
        85:6d:99:69:22:36:5c:63:b3:92:04:7d:63:01:76:0e:
        97:08:6f:fc:26:62:f5:58:93:36:b5:90:02:c7:de:11:
        5f:eb:34:68:55:9d:2b:0e:ba:65:ed:9a:a9:71:3b:c2:
        4b:7a:f0:c1:3d:8a:4f:d2:d1:e3:b8:81:a5:7b:b7:e0:
        7f:11:c6:8d:82:9f:6d:ca:a7:28:6b:07:0d:b9:4c:25
    Fingerprint (MD5):
        58:46:F6:80:41:5B:63:89:E1:5D:B5:D7:3D:4A:6B:D1
    Fingerprint (SHA1):
        D0:55:D6:7E:18:16:7A:16:4B:78:90:32:DF:25:9A:2B:21:3B:92:D7


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US"
Returned value is 0, expected result is pass
chains.sh: #3847: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der
vfychain  -pp -vv     -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3848: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der
vfychain  -pp -vv     -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3849: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der
vfychain  -pp -vv     -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3850: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der
vfychain  -pp -vv     -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3851: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der
vfychain  -pp -vv     -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #3852: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3853: RealCerts: Creating DB AllDB  - PASSED
chains.sh: Importing certificate TestCA.ca.cert to AllDB database
certutil -A -n TestCA.ca  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/TestCA.ca.cert
chains.sh: #3854: RealCerts: Importing certificate TestCA.ca.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser50.cert to AllDB database
certutil -A -n TestUser50  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert
chains.sh: #3855: RealCerts: Importing certificate TestUser50.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser51.cert to AllDB database
certutil -A -n TestUser51  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert
chains.sh: #3856: RealCerts: Importing certificate TestUser51.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalRootCA.cert to AllDB database
certutil -A -n PayPalRootCA  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/PayPalRootCA.cert
chains.sh: #3857: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalICA.cert to AllDB database
certutil -A -n PayPalICA  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/PayPalICA.cert
chains.sh: #3858: RealCerts: Importing certificate PayPalICA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalEE.cert to AllDB database
certutil -A -n PayPalEE  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert
chains.sh: #3859: RealCerts: Importing certificate PayPalEE.cert to AllDB database  - PASSED
chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database
certutil -A -n BrAirWaysBadSig  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert
chains.sh: #3860: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  TestUser50.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Mar 19 21:04:25 2008
            Not After : Tue Mar 19 21:04:25 2058
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61:
                    fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82:
                    9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae:
                    c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03:
                    a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0:
                    a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b:
                    2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9:
                    aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e:
        0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18:
        57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc:
        58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38:
        5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62:
        57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55:
        0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a:
        f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7
    Fingerprint (MD5):
        35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27
    Fingerprint (SHA1):
        52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #3861: RealCerts: Verifying certificate(s)  TestUser50.cert with flags  -d AllDB     - PASSED
chains.sh: Verifying certificate(s)  TestUser51.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Mar 19 21:04:25 2008
            Not After : Tue Mar 19 21:04:25 2058
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61:
                    fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82:
                    9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae:
                    c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03:
                    a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0:
                    a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b:
                    2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9:
                    aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e:
        0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18:
        57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc:
        58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38:
        5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62:
        57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55:
        0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a:
        f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7
    Fingerprint (MD5):
        35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27
    Fingerprint (SHA1):
        52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #3862: RealCerts: Verifying certificate(s)  TestUser51.cert with flags  -d AllDB     - PASSED
chains.sh: Verifying certificate(s)  PayPalEE.cert with flags  -d AllDB    -o OID.2.16.840.1.113733.1.7.23.6 
vfychain -d AllDB -pp -vv     -o OID.2.16.840.1.113733.1.7.23.6  /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            58:f3:9e:5c:01:2b:19:47:21:a9:8e:e4:ee:e0:f8:bf
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "OU=Class 3 Public Primary Certification Authority,O="VeriSig
            n, Inc.",C=US"
        Validity:
            Not Before: Wed Nov 08 00:00:00 2006
            Not After : Sun Nov 07 23:59:59 2021
        Subject: "CN=VeriSign Class 3 Public Primary Certification Authority 
            - G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve
            riSign Trust Network,O="VeriSign, Inc.",C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc:
                    7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64:
                    85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42:
                    b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec:
                    ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3:
                    62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b:
                    9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f:
                    e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db:
                    7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af:
                    1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a:
                    b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7:
                    ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74:
                    24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4:
                    8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95:
                    ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f:
                    73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: CRL Distribution Points
            Distribution point:
                URI: "http://crl.verisign.com/pca3.crl"

            Name: Certificate Key Usage
            Critical: True
            Usages: Certificate Signing
                    CRL Signing

            Name: OID.1.3.6.1.5.5.7.1.12
            Data: Sequence {
                [1]: {
                    [0]: {
                        Sequence {
                            Sequence {
                                Sequence {
                                    "image/gif"
                                    Sequence {
                                        Sequence {
                                            Sequence {
                                                SHA-1
                                            }
                                            8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf:
                                            80:6a:d4:48:18:2c:7b:19:2e
                                        }
                                    }
                                    Sequence {
                                        "http://logo.verisign.com/vslogo.gif"
                                    }
                                }
                            }
                        }
                    }
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: Certificate Policies AnyPolicy
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                    Policy Qualifier Data: "https://www.verisign.com/cps"

            Name: Certificate Subject Key ID
            Data:
                7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02:
                af:33:31:33

            Name: Certificate Authority Key Identifier
            Issuer: 
                Directory Name: "OU=Class 3 Public Primary Certification Auth
                    ority,O="VeriSign, Inc.",C=US"
            Serial Number:
                70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:15:49:5e:6b:26:ce:ee:98:e7:4d:a5:92:3f:75:6a:
        f0:33:0b:fa:09:dc:28:92:ab:8d:6a:31:41:d9:47:31:
        47:46:09:a1:39:05:3e:66:65:19:8b:32:bf:61:2c:1c:
        d5:6a:03:6f:44:dc:3b:af:ef:1b:93:58:d6:bd:ce:d0:
        ed:b6:89:77:51:15:59:32:28:c5:7a:89:8c:da:3e:6d:
        5c:75:ac:86:d4:c7:9e:fd:38:3e:96:73:40:87:34:6a:
        84:4e:31:a8:d2:a2:b9:3c:4e:06:dd:cb:b2:7c:ae:e1:
        d5:9f:1e:74:e5:24:f0:cf:e4:9b:ec:25:ea:cd:ec:f6
    Fingerprint (MD5):
        C8:DE:26:6F:0A:C4:1C:6D:46:9C:CC:AD:0A:C4:D5:1C
    Fingerprint (SHA1):
        87:50:7F:E5:19:BD:E7:A1:19:AE:A3:2F:77:9D:76:30:5D:7A:69:13

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=www.paypal.com,OU=PayPal Production,O="PayPal, Inc
    .",STREET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C=
    US,serialNumber=3014267,businessCategory=Private Organization,incorporati
    onState=Delaware,incorporationCountry=US"
Certificate 2 Subject: "CN=VeriSign Class 3 Extended Validation SSL CA,OU=Ter
    ms of use at https://www.verisign.com/rpa (c)06,OU=VeriSign Trust Network
    ,O="VeriSign, Inc.",C=US"
Returned value is 0, expected result is pass
chains.sh: #3863: RealCerts: Verifying certificate(s)  PayPalEE.cert with flags  -d AllDB    -o OID.2.16.840.1.113733.1.7.23.6  - PASSED
chains.sh: Verifying certificate(s)  BrAirWaysBadSig.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. BrAirWaysBadSig :
  ERROR -8181: Peer's Certificate has expired.
Returned value is 1, expected result is fail
chains.sh: #3864: RealCerts: Verifying certificate(s)  BrAirWaysBadSig.cert with flags  -d AllDB     - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3865: DSA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190774 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3866: DSA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3867: DSA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3868: DSA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3869: DSA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127190775   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3870: DSA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #3871: DSA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #3872: DSA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3873: DSA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127190776   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3874: DSA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #3875: DSA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3876: DSA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3877: DSA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1127190777   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3878: DSA: Creating certficate CA2Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA2Root.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der
chains.sh: #3879: DSA: Importing certificate CA2Root.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #3880: DSA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3881: DSA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1127190778   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3882: DSA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #3883: DSA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #3884: DSA: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3885: DSA: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1127190779   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3886: DSA: Creating certficate CA3Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA3Root.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der
chains.sh: #3887: DSA: Importing certificate CA3Root.der to CA3DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #3888: DSA: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R  -d EE3DB -f EE3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3889: DSA: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1127190780   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3890: DSA: Creating certficate EE3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate EE3CA3.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der
chains.sh: #3891: DSA: Importing certificate EE3CA3.der to EE3DB database  - PASSED
chains.sh: Creating DB CA4DB
certutil -N -d CA4DB -f CA4DB/dbpasswd
chains.sh: #3892: DSA: Creating DB CA4DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA4Req.der
certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA4Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3893: DSA: Creating Intermediate certifiate request CA4Req.der  - PASSED
chains.sh: Creating certficate CA4Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1127190781   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3894: DSA: Creating certficate CA4Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA4Root.der to CA4DB database
certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der
chains.sh: #3895: DSA: Importing certificate CA4Root.der to CA4DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #3896: DSA: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R  -d EE4DB -f EE4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE4Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3897: DSA: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA4.der signed by CA4
certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1127190782   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3898: DSA: Creating certficate EE4CA4.der signed by CA4  - PASSED
chains.sh: Importing certificate EE4CA4.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der
chains.sh: #3899: DSA: Importing certificate EE4CA4.der to EE4DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3900: DSA: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE1CA1.der CA1Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190774 (0x432f90f6)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:08:08 2012
            Not After : Tue Nov 28 00:08:08 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    71:5f:35:c8:dc:8b:c5:77:a9:17:a6:b9:61:c0:56:2c:
                    e7:3b:c5:ea:e7:09:12:1f:2b:fd:a4:63:92:87:c8:47:
                    23:b3:fa:e5:3e:ea:64:05:a8:5c:e5:3a:72:5c:2b:0b:
                    aa:6c:9b:ac:c3:b1:b1:1c:4b:75:ea:c2:87:6b:b2:81:
                    1c:7a:f3:94:42:ec:6e:06:34:b9:bd:dd:e4:64:ef:34:
                    76:3a:0c:87:07:74:56:44:9b:89:5a:74:b3:08:e0:91:
                    9e:df:7e:53:a8:52:67:87:ec:1b:66:20:2c:9f:b6:54:
                    46:3d:78:a1:91:e9:b7:27:41:4c:2e:01:32:a4:5d:c1
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:14:68:31:a9:95:ac:c1:65:8f:c8:33:c8:fb:
        3d:30:4e:c5:0c:f4:38:cd:02:15:00:8b:e7:17:05:0b:
        32:ba:84:b6:a0:f5:54:43:9b:23:dd:67:fb:eb:2c
    Fingerprint (MD5):
        9D:3C:4E:53:1A:0F:33:1A:D8:18:0A:6B:FE:A5:62:0B
    Fingerprint (SHA1):
        DC:98:50:D5:F3:FB:FA:53:A4:B0:52:1B:C7:39:8A:AD:C8:31:FB:F4


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3901: DSA: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE2CA2.der CA2Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190774 (0x432f90f6)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:08:08 2012
            Not After : Tue Nov 28 00:08:08 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    71:5f:35:c8:dc:8b:c5:77:a9:17:a6:b9:61:c0:56:2c:
                    e7:3b:c5:ea:e7:09:12:1f:2b:fd:a4:63:92:87:c8:47:
                    23:b3:fa:e5:3e:ea:64:05:a8:5c:e5:3a:72:5c:2b:0b:
                    aa:6c:9b:ac:c3:b1:b1:1c:4b:75:ea:c2:87:6b:b2:81:
                    1c:7a:f3:94:42:ec:6e:06:34:b9:bd:dd:e4:64:ef:34:
                    76:3a:0c:87:07:74:56:44:9b:89:5a:74:b3:08:e0:91:
                    9e:df:7e:53:a8:52:67:87:ec:1b:66:20:2c:9f:b6:54:
                    46:3d:78:a1:91:e9:b7:27:41:4c:2e:01:32:a4:5d:c1
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:14:68:31:a9:95:ac:c1:65:8f:c8:33:c8:fb:
        3d:30:4e:c5:0c:f4:38:cd:02:15:00:8b:e7:17:05:0b:
        32:ba:84:b6:a0:f5:54:43:9b:23:dd:67:fb:eb:2c
    Fingerprint (MD5):
        9D:3C:4E:53:1A:0F:33:1A:D8:18:0A:6B:FE:A5:62:0B
    Fingerprint (SHA1):
        DC:98:50:D5:F3:FB:FA:53:A4:B0:52:1B:C7:39:8A:AD:C8:31:FB:F4


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3902: DSA: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE3CA3.der CA3Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190774 (0x432f90f6)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:08:08 2012
            Not After : Tue Nov 28 00:08:08 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    71:5f:35:c8:dc:8b:c5:77:a9:17:a6:b9:61:c0:56:2c:
                    e7:3b:c5:ea:e7:09:12:1f:2b:fd:a4:63:92:87:c8:47:
                    23:b3:fa:e5:3e:ea:64:05:a8:5c:e5:3a:72:5c:2b:0b:
                    aa:6c:9b:ac:c3:b1:b1:1c:4b:75:ea:c2:87:6b:b2:81:
                    1c:7a:f3:94:42:ec:6e:06:34:b9:bd:dd:e4:64:ef:34:
                    76:3a:0c:87:07:74:56:44:9b:89:5a:74:b3:08:e0:91:
                    9e:df:7e:53:a8:52:67:87:ec:1b:66:20:2c:9f:b6:54:
                    46:3d:78:a1:91:e9:b7:27:41:4c:2e:01:32:a4:5d:c1
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:14:68:31:a9:95:ac:c1:65:8f:c8:33:c8:fb:
        3d:30:4e:c5:0c:f4:38:cd:02:15:00:8b:e7:17:05:0b:
        32:ba:84:b6:a0:f5:54:43:9b:23:dd:67:fb:eb:2c
    Fingerprint (MD5):
        9D:3C:4E:53:1A:0F:33:1A:D8:18:0A:6B:FE:A5:62:0B
    Fingerprint (SHA1):
        DC:98:50:D5:F3:FB:FA:53:A4:B0:52:1B:C7:39:8A:AD:C8:31:FB:F4


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #3903: DSA: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE4CA4.der CA4Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127190774 (0x432f90f6)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:08:08 2012
            Not After : Tue Nov 28 00:08:08 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    71:5f:35:c8:dc:8b:c5:77:a9:17:a6:b9:61:c0:56:2c:
                    e7:3b:c5:ea:e7:09:12:1f:2b:fd:a4:63:92:87:c8:47:
                    23:b3:fa:e5:3e:ea:64:05:a8:5c:e5:3a:72:5c:2b:0b:
                    aa:6c:9b:ac:c3:b1:b1:1c:4b:75:ea:c2:87:6b:b2:81:
                    1c:7a:f3:94:42:ec:6e:06:34:b9:bd:dd:e4:64:ef:34:
                    76:3a:0c:87:07:74:56:44:9b:89:5a:74:b3:08:e0:91:
                    9e:df:7e:53:a8:52:67:87:ec:1b:66:20:2c:9f:b6:54:
                    46:3d:78:a1:91:e9:b7:27:41:4c:2e:01:32:a4:5d:c1
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:14:68:31:a9:95:ac:c1:65:8f:c8:33:c8:fb:
        3d:30:4e:c5:0c:f4:38:cd:02:15:00:8b:e7:17:05:0b:
        32:ba:84:b6:a0:f5:54:43:9b:23:dd:67:fb:eb:2c
    Fingerprint (MD5):
        9D:3C:4E:53:1A:0F:33:1A:D8:18:0A:6B:FE:A5:62:0B
    Fingerprint (SHA1):
        DC:98:50:D5:F3:FB:FA:53:A4:B0:52:1B:C7:39:8A:AD:C8:31:FB:F4


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US"
Returned value is 0, expected result is pass
chains.sh: #3904: DSA: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3905: Revocation: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 10 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3906: Revocation: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3907: Revocation: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #3908: Revocation: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA0Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3909: Revocation: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3910: Revocation: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
chains.sh: #3911: Revocation: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3912: Revocation: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3913: Revocation: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3914: Revocation: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
chains.sh: #3915: Revocation: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #3916: Revocation: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE11Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3917: Revocation: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3918: Revocation: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
chains.sh: #3919: Revocation: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB EE12DB
certutil -N -d EE12DB -f EE12DB/dbpasswd
chains.sh: #3920: Revocation: Creating DB EE12DB  - PASSED
chains.sh: Creating EE certifiate request EE12Req.der
certutil -s "CN=EE12 EE, O=EE12, C=US"  -R  -d EE12DB -f EE12DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE12Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3921: Revocation: Creating EE certifiate request EE12Req.der  - PASSED
chains.sh: Creating certficate EE12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3922: Revocation: Creating certficate EE12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE12CA1.der to EE12DB database
certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der
chains.sh: #3923: Revocation: Importing certificate EE12CA1.der to EE12DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3924: Revocation: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3925: Revocation: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3926: Revocation: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
chains.sh: #3927: Revocation: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #3928: Revocation: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE21Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3929: Revocation: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3930: Revocation: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
chains.sh: #3931: Revocation: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20121128000813Z
nextupdate=20131128000813Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Wed Nov 28 00:08:13 2012
    Next Update: Thu Nov 28 00:08:13 2013
    CRL Extensions:
chains.sh: #3932: Revocation: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128000813Z
nextupdate=20131128000813Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 00:08:13 2012
    Next Update: Thu Nov 28 00:08:13 2013
    CRL Extensions:
chains.sh: #3933: Revocation: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128000813Z
nextupdate=20131128000813Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 00:08:13 2012
    Next Update: Thu Nov 28 00:08:13 2013
    CRL Extensions:
chains.sh: #3934: Revocation: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20121128000813Z
nextupdate=20131128000813Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Wed Nov 28 00:08:13 2012
    Next Update: Thu Nov 28 00:08:13 2013
    CRL Extensions:
chains.sh: #3935: Revocation: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 14 issued by CA1
crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128000814Z
addcert 14 20121128000814Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 00:08:14 2012
    Next Update: Thu Nov 28 00:08:13 2013
    Entry 1 (0x1):
        Serial Number: 14 (0xe)
        Revocation Date: Wed Nov 28 00:08:14 2012
    CRL Extensions:
chains.sh: #3936: Revocation: Revoking certificate with SN 14 issued by CA1  - PASSED
chains.sh: Revoking certificate with SN 15 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128000815Z
addcert 15 20121128000815Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 00:08:15 2012
    Next Update: Thu Nov 28 00:08:13 2013
    Entry 1 (0x1):
        Serial Number: 15 (0xf)
        Revocation Date: Wed Nov 28 00:08:15 2012
    CRL Extensions:
chains.sh: #3937: Revocation: Revoking certificate with SN 15 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #3938: Revocation: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #3939: Revocation: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #3940: Revocation: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA0Root.der to AllDB database
certutil -A -n CA0  -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der
chains.sh: #3941: Revocation: Importing certificate CA0Root.der to AllDB database  - PASSED
chains.sh: Importing CRL CA0.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl
chains.sh: #3942: Revocation: Importing CRL CA0.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA1CA0.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der
chains.sh: #3943: Revocation: Importing certificate CA1CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA1.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl
chains.sh: #3944: Revocation: Importing CRL CA1.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA0.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der
chains.sh: #3945: Revocation: Importing certificate CA2CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA2.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl
chains.sh: #3946: Revocation: Importing CRL CA2.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:08:11 2012
            Not After : Tue Nov 28 00:08:11 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:81:42:ec:c9:6b:19:43:9d:82:4e:7d:bc:8a:44:f4:
                    09:42:c5:a0:0b:16:35:cc:ab:64:01:a8:c5:4e:e4:76:
                    76:56:b9:e4:27:40:06:97:44:8c:8b:65:b9:e9:16:23:
                    21:01:40:ac:ab:5d:41:55:40:95:b7:ba:e7:2d:ea:8b:
                    81:68:e0:e0:07:60:5d:b3:46:f9:12:41:9b:70:06:7c:
                    af:78:51:f2:45:17:f7:ef:a3:4e:b3:13:eb:51:5d:d2:
                    74:6b:ab:40:2f:16:87:12:f7:d8:6c:d8:6b:85:d6:9e:
                    16:0b:06:5f:73:ad:90:3c:d5:e5:75:d3:be:ca:1d:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5d:82:a6:72:22:5a:6a:58:63:d1:ed:19:3f:d1:0d:70:
        12:64:40:d3:7a:cc:3d:61:ab:5c:54:29:96:01:d8:34:
        1e:44:fa:04:c7:b2:4a:3c:11:99:b5:f4:89:d5:48:79:
        0c:65:b0:dd:46:95:25:3a:62:75:c2:a3:91:87:02:29:
        db:83:df:91:34:32:42:91:73:d9:73:41:16:6f:52:4e:
        ed:bf:eb:7f:12:ef:ce:b7:a1:6f:aa:73:3e:d4:dc:c4:
        db:6b:40:1a:76:43:5c:a6:a2:1f:be:24:0d:95:ea:4d:
        a0:69:e6:0b:d9:7f:f7:7f:c4:4c:d9:f8:70:9e:3b:aa
    Fingerprint (MD5):
        E2:A0:FB:6F:07:16:11:B2:CD:EA:9C:EA:BF:76:AB:00
    Fingerprint (SHA1):
        AA:C8:14:D3:E8:52:43:A1:4F:63:57:22:F8:46:FA:E9:5A:64:8F:18

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #3947: Revocation: Verifying certificate(s)  EE11CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE12CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -m crl     EE12CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3948: Revocation: Verifying certificate(s)  EE12CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags  -g chain -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g chain -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:08:11 2012
            Not After : Tue Nov 28 00:08:11 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:81:42:ec:c9:6b:19:43:9d:82:4e:7d:bc:8a:44:f4:
                    09:42:c5:a0:0b:16:35:cc:ab:64:01:a8:c5:4e:e4:76:
                    76:56:b9:e4:27:40:06:97:44:8c:8b:65:b9:e9:16:23:
                    21:01:40:ac:ab:5d:41:55:40:95:b7:ba:e7:2d:ea:8b:
                    81:68:e0:e0:07:60:5d:b3:46:f9:12:41:9b:70:06:7c:
                    af:78:51:f2:45:17:f7:ef:a3:4e:b3:13:eb:51:5d:d2:
                    74:6b:ab:40:2f:16:87:12:f7:d8:6c:d8:6b:85:d6:9e:
                    16:0b:06:5f:73:ad:90:3c:d5:e5:75:d3:be:ca:1d:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5d:82:a6:72:22:5a:6a:58:63:d1:ed:19:3f:d1:0d:70:
        12:64:40:d3:7a:cc:3d:61:ab:5c:54:29:96:01:d8:34:
        1e:44:fa:04:c7:b2:4a:3c:11:99:b5:f4:89:d5:48:79:
        0c:65:b0:dd:46:95:25:3a:62:75:c2:a3:91:87:02:29:
        db:83:df:91:34:32:42:91:73:d9:73:41:16:6f:52:4e:
        ed:bf:eb:7f:12:ef:ce:b7:a1:6f:aa:73:3e:d4:dc:c4:
        db:6b:40:1a:76:43:5c:a6:a2:1f:be:24:0d:95:ea:4d:
        a0:69:e6:0b:d9:7f:f7:7f:c4:4c:d9:f8:70:9e:3b:aa
    Fingerprint (MD5):
        E2:A0:FB:6F:07:16:11:B2:CD:EA:9C:EA:BF:76:AB:00
    Fingerprint (SHA1):
        AA:C8:14:D3:E8:52:43:A1:4F:63:57:22:F8:46:FA:E9:5A:64:8F:18

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #3949: Revocation: Verifying certificate(s)  EE11CA1.der with flags  -g chain -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der with flags  -g chain -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g chain -m crl     EE21CA2.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3950: Revocation: Verifying certificate(s)  EE21CA2.der with flags  -g chain -m crl -d AllDB     -t Root.der - PASSED
chains.sh: #3951: Test that OCSP server is reachable - PASSED
chains.sh: Creating DB OCSPRootDB
certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd
chains.sh: #3952: OCSP: Creating DB OCSPRootDB  - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRootDB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #3953: OCSP: Importing certificate OCSPRoot.cert to OCSPRootDB database  - PASSED
chains.sh: Creating DB OCSPCA1DB
certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd
chains.sh: #3954: OCSP: Creating DB OCSPCA1DB  - PASSED
chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin/pk12util -d OCSPCA1DB -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss
pk12util: PKCS12 IMPORT SUCCESSFUL
chains.sh: #3955: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database  - PASSED
chains.sh: Create CRL for OCSPCA1DB
crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128000816Z
nextupdate=20131128000816Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Wed Nov 28 00:08:16 2012
    Next Update: Thu Nov 28 00:08:16 2013
    CRL Extensions:
chains.sh: #3956: OCSP: Create CRL for OCSPCA1DB  - PASSED
chains.sh: Revoking certificate with SN 3 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128000817Z
addcert 3 20121128000817Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Wed Nov 28 00:08:17 2012
    Next Update: Thu Nov 28 00:08:16 2013
    Entry 1 (0x1):
        Serial Number: 3 (0x3)
        Revocation Date: Wed Nov 28 00:08:17 2012
    CRL Extensions:
chains.sh: #3957: OCSP: Revoking certificate with SN 3 issued by OCSPCA1  - PASSED
chains.sh: Revoking certificate with SN 4 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128000818Z
addcert 4 20121128000818Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Wed Nov 28 00:08:18 2012
    Next Update: Thu Nov 28 00:08:16 2013
    Entry 1 (0x1):
        Serial Number: 4 (0x4)
        Revocation Date: Wed Nov 28 00:08:18 2012
    Entry 2 (0x2):
        Serial Number: 3 (0x3)
        Revocation Date: Wed Nov 28 00:08:17 2012
    CRL Extensions:
chains.sh: #3958: OCSP: Revoking certificate with SN 4 issued by OCSPCA1  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE11.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE11.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3959: OCSP: Verifying certificate(s)  OCSPEE11.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3960: OCSP: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3961: OCSP: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3962: OCSP: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3963: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3964: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g chain -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g chain -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3965: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g chain -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE31.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA3.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US"
Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #3966: OCSP: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE31.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA3.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3967: OCSP: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s doNotUse -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s doNotUse     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3968: OCSP: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s doNotUse -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s forbidFetching -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s forbidFetching     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #3969: OCSP: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s forbidFetching -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s failIfNoInfo     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8071: The OCSP server experienced an internal error.
Returned value is 1, expected result is fail
chains.sh: #3970: OCSP: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s failIfNoInfo     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3971: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE13.cert OCSPCA1.cert with flags  -g leaf -h testLocalInfoFirst -m ocsp -d OCSPCA1DB     -t OCSPCA1
vfychain -d OCSPCA1DB -pp -vv  -g leaf -h testLocalInfoFirst -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE13.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPCA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:46 2012
            Not After : Mon Apr 03 15:38:46 2017
        Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c1:b0:47:12:51:37:68:7d:39:cb:ee:e3:32:2c:ad:b5:
                    44:2c:72:7f:c8:e9:32:79:d9:7d:b9:69:94:bc:5a:9e:
                    5a:3b:0f:e2:07:e5:b2:76:04:73:32:ee:92:8d:a1:2f:
                    ed:e4:e0:5a:92:28:ca:bb:48:fc:5c:44:dc:9a:c0:3b:
                    88:84:0a:bd:6b:4a:c9:18:37:51:e3:a3:3a:e0:40:5c:
                    53:0d:04:ed:c7:18:34:25:5a:5e:00:f5:0d:29:ef:fa:
                    69:e3:6d:96:e3:1e:5b:8a:4e:3e:77:e7:45:16:81:6f:
                    21:01:2c:8d:b1:fa:57:06:f0:9b:95:1a:c3:0d:25:25
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Authority Information Access
            Method: PKIX Online Certificate Status Protocol
            Location: 
                URI: "http://ocsp.kuix.de:2600"

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        88:c4:da:b7:3d:84:1d:1c:ca:f8:c1:2e:46:59:c2:33:
        93:64:38:f9:2a:87:32:ca:ec:e0:ef:ff:cc:1f:9d:96:
        a6:42:b0:cd:8f:b3:85:3a:59:64:34:c1:0d:bb:24:c5:
        36:f6:28:93:a0:3b:58:b8:93:87:c5:6e:f2:64:23:b9:
        c4:a9:53:82:bd:0a:12:92:58:90:01:b1:11:a6:65:aa:
        a9:72:94:60:96:38:fd:e3:9e:14:5b:4e:ed:0d:99:e2:
        94:6a:50:84:88:00:1e:14:a7:ed:20:69:95:9b:cb:b7:
        61:11:b8:14:7a:1e:19:3c:bb:38:5b:97:e0:ad:9f:2e
    Fingerprint (MD5):
        6E:22:37:7A:94:F2:07:60:87:6B:9D:CF:64:C9:D9:37
    Fingerprint (SHA1):
        92:63:FD:E1:AA:A4:45:54:F7:E8:B7:5F:92:8F:74:06:3E:96:BA:47

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User

Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US"
Returned value is 0, expected result is pass
chains.sh: #3972: OCSP: Verifying certificate(s)  OCSPEE13.cert OCSPCA1.cert with flags  -g leaf -h testLocalInfoFirst -m ocsp -d OCSPCA1DB     -t OCSPCA1 - PASSED
chains.sh: Creating DB OCSPRoot1DB
certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd
chains.sh: #3973: OCSP: Creating DB OCSPRoot1DB  - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRoot1DB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #3974: OCSP: Importing certificate OCSPRoot.cert to OCSPRoot1DB database  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot1DB     -t OCSPRoot
vfychain -d OCSPRoot1DB -pp -vv  -g chain -m ocsp -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE23.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #3975: OCSP: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot1DB     -t OCSPRoot - PASSED
chains.sh: Creating DB OCSPRoot2DB
certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd
chains.sh: #3976: OCSP: Creating DB OCSPRoot2DB  - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRoot2DB database
certutil -A -n OCSPRoot  -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #3977: OCSP: Importing certificate OCSPRoot.cert to OCSPRoot2DB database  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot2DB     -t OCSPRoot
vfychain -d OCSPRoot2DB -pp -vv  -g chain -m ocsp -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE23.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted Client CA
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #3978: OCSP: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot2DB     -t OCSPRoot - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #3979: CRLDP: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -m 1127190783 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #3980: CRLDP: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #3981: CRLDP: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #3982: CRLDP: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA0Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #3983: CRLDP: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1127190784   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3984: CRLDP: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
chains.sh: #3985: CRLDP: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #3986: CRLDP: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA1Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0-1127190673.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3987: CRLDP: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0Root-1127190660.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3988: CRLDP: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
chains.sh: #3989: CRLDP: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #3990: CRLDP: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE11Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0-1127190673.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3991: CRLDP: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1127190785   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #3992: CRLDP: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
chains.sh: #3993: CRLDP: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #3994: CRLDP: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o CA2Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0-1127190673.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #3995: CRLDP: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0Root-1127190661.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #3996: CRLDP: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
chains.sh: #3997: CRLDP: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #3998: CRLDP: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE21Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #3999: CRLDP: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1127190786   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===

===
chains.sh: #4000: CRLDP: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
chains.sh: #4001: CRLDP: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #4002: CRLDP: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE1Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0-1127190673.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4003: CRLDP: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0Root-1127190662.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #4004: CRLDP: Creating certficate EE1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE1CA0.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der
chains.sh: #4005: CRLDP: Importing certificate EE1CA0.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #4006: CRLDP: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/tests_noise -o EE2Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0-1127190673.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #4007: CRLDP: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0Root-1127190663.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #4008: CRLDP: Creating certficate EE2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE2CA0.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der
chains.sh: #4009: CRLDP: Importing certificate EE2CA0.der to EE2DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20121128000827Z
nextupdate=20131128000827Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Wed Nov 28 00:08:27 2012
    Next Update: Thu Nov 28 00:08:27 2013
    CRL Extensions:
chains.sh: #4010: CRLDP: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128000827Z
nextupdate=20131128000827Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 00:08:27 2012
    Next Update: Thu Nov 28 00:08:27 2013
    CRL Extensions:
chains.sh: #4011: CRLDP: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128000827Z
nextupdate=20131128000827Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 00:08:27 2012
    Next Update: Thu Nov 28 00:08:27 2013
    CRL Extensions:
chains.sh: #4012: CRLDP: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20121128000827Z
nextupdate=20131128000827Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Wed Nov 28 00:08:27 2012
    Next Update: Thu Nov 28 00:08:27 2013
    CRL Extensions:
chains.sh: #4013: CRLDP: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 20 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128000828Z
addcert 20 20121128000828Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 00:08:28 2012
    Next Update: Thu Nov 28 00:08:27 2013
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Wed Nov 28 00:08:28 2012
    CRL Extensions:
chains.sh: #4014: CRLDP: Revoking certificate with SN 20 issued by CA0  - PASSED
chains.sh: Revoking certificate with SN 40 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128000829Z
addcert 40 20121128000829Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 00:08:29 2012
    Next Update: Thu Nov 28 00:08:27 2013
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Wed Nov 28 00:08:28 2012
    Entry 2 (0x2):
        Serial Number: 40 (0x28)
        Revocation Date: Wed Nov 28 00:08:29 2012
    CRL Extensions:
chains.sh: #4015: CRLDP: Revoking certificate with SN 40 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #4016: CRLDP: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #4017: CRLDP: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #4018: CRLDP: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g chain -h requireFreshInfo -m crl -f    EE11CA1.der CA1CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #4019: CRLDP: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - FAILED
chains.sh: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g chain -h requireFreshInfo -m crl -f    EE21CA2.der CA2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is fail
chains.sh: #4020: CRLDP: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -h requireFreshInfo -m crl -f    EE1CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=EE1 EE,O=EE1,C=US [Certificate Authority]:
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is pass
chains.sh: #4021: CRLDP: Verifying certificate(s)  EE1CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - FAILED
chains.sh: Verifying certificate(s)  EE2CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -h requireFreshInfo -m crl -f    EE2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=EE2 EE,O=EE2,C=US [Certificate Authority]:
  ERROR -5961: TCP connection reset by peer
Returned value is 1, expected result is fail
chains.sh: #4022: CRLDP: Verifying certificate(s)  EE2CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
trying to kill httpserv with PID 29344 at Tue Nov 27 19:08:42 EST 2012
kill -USR1 29344
selfserv: normal termination
httpserv -b -p 8553 2>/dev/null;
httpserv with PID 29344 killed at Tue Nov 27 19:08:42 EST 2012
TIMESTAMP chains END: Tue Nov 27 19:08:42 EST 2012
chains.sh: Testing with PKIX ===============================
Running tests for lowhash
TIMESTAMP lowhash BEGIN: Tue Nov 27 19:08:42 EST 2012
lowhash.sh: Lowhash Tests ===============================
lowhashtest with fips mode=
lowhashtest MD5
lowhash.sh: #4023: lowhashtest with fips mode= for MD5  - PASSED
lowhashtest SHA1
lowhash.sh: #4024: lowhashtest with fips mode= for SHA1  - PASSED
lowhashtest SHA224
lowhash.sh: #4025: lowhashtest with fips mode= for SHA224  - PASSED
lowhashtest SHA256
lowhash.sh: #4026: lowhashtest with fips mode= for SHA256  - PASSED
lowhashtest SHA384
lowhash.sh: #4027: lowhashtest with fips mode= for SHA384  - PASSED
lowhashtest SHA512
lowhash.sh: #4028: lowhashtest with fips mode= for SHA512  - PASSED
lowhashtest with fips mode=
lowhashtest MD5
lowhash.sh: #4029: lowhashtest with fips mode= for MD5  - PASSED
lowhashtest SHA1
lowhash.sh: #4030: lowhashtest with fips mode= for SHA1  - PASSED
lowhashtest SHA224
lowhash.sh: #4031: lowhashtest with fips mode= for SHA224  - PASSED
lowhashtest SHA256
lowhash.sh: #4032: lowhashtest with fips mode= for SHA256  - PASSED
lowhashtest SHA384
lowhash.sh: #4033: lowhashtest with fips mode= for SHA384  - PASSED
lowhashtest SHA512
lowhash.sh: #4034: lowhashtest with fips mode= for SHA512  - PASSED
lowhash.sh done
TIMESTAMP lowhash END: Tue Nov 27 19:08:43 EST 2012
Running tests for libpkix
TIMESTAMP libpkix BEGIN: Tue Nov 27 19:08:43 EST 2012
TIMESTAMP libpkix END: Tue Nov 27 19:08:43 EST 2012
Running tests for cert
TIMESTAMP cert BEGIN: Tue Nov 27 19:08:43 EST 2012
cert.sh: Certutil and Crlutil Tests with ECC ===============================
cert.sh: #4035: Looking for root certs module. - PASSED
cert.sh: Creating a CA Certificate TestCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -f ../tests.pw
cert.sh: #4036: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4037: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert TestCA  --------------------------
certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4038: Creating CA Cert TestCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n TestCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -o root.cert
cert.sh: #4039: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate serverCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -f ../tests.pw
cert.sh: #4040: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4041: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert serverCA  --------------------------
certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4042: Creating CA Cert serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n serverCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -o root.cert
cert.sh: #4043: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-serverCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA
cert.sh: Creating CA Cert chain-1-serverCA  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4044: Creating CA Cert chain-1-serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-serverCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -o root.cert
cert.sh: #4045: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-serverCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA
cert.sh: Creating CA Cert chain-2-serverCA  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4046: Creating CA Cert chain-2-serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-serverCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -o root.cert
cert.sh: #4047: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate clientCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -f ../tests.pw
cert.sh: #4048: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4049: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert clientCA  --------------------------
certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4050: Creating CA Cert clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n clientCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -o root.cert
cert.sh: #4051: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-clientCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA
cert.sh: Creating CA Cert chain-1-clientCA  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4052: Creating CA Cert chain-1-clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-clientCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -o root.cert
cert.sh: #4053: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-clientCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA
cert.sh: Creating CA Cert chain-2-clientCA  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4054: Creating CA Cert chain-2-clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-clientCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -o root.cert
cert.sh: #4055: Exporting Root Cert - PASSED
cert.sh: Creating an EC CA Certificate TestCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA
cert.sh: Creating EC CA Cert TestCA-ec  --------------------------
certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4056: Creating EC CA Cert TestCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n TestCA-ec -r -d . -o ecroot.cert
cert.sh: #4057: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate serverCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA
cert.sh: Creating EC CA Cert serverCA-ec  --------------------------
certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4058: Creating EC CA Cert serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n serverCA-ec -r -d . -o ecroot.cert
cert.sh: #4059: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA
cert.sh: Creating EC CA Cert chain-1-serverCA-ec  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4060: Creating EC CA Cert chain-1-serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #4061: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA
cert.sh: Creating EC CA Cert chain-2-serverCA-ec  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4062: Creating EC CA Cert chain-2-serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #4063: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate clientCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA
cert.sh: Creating EC CA Cert clientCA-ec  --------------------------
certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4064: Creating EC CA Cert clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n clientCA-ec -r -d . -o ecroot.cert
cert.sh: #4065: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA
cert.sh: Creating EC CA Cert chain-1-clientCA-ec  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4066: Creating EC CA Cert chain-1-clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #4067: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA
cert.sh: Creating EC CA Cert chain-2-clientCA-ec  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4068: Creating EC CA Cert chain-2-clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #4069: Exporting EC Root Cert - PASSED
cert.sh: Creating Certificates, issued by the last ===============
     of a chain of CA's which are not in the same database============
Server Cert
cert.sh: Initializing buildnss02.usersys.redhat.com's Cert DB (ext.) --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -f ../tests.pw
cert.sh: #4070: Initializing buildnss02.usersys.redhat.com's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4071: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for buildnss02.usersys.redhat.com (ext) --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4072: Generate Cert Request for buildnss02.usersys.redhat.com (ext) - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 200 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -i req -o buildnss02.usersys.redhat.com.cert -f ../tests.pw
cert.sh: #4073: Sign buildnss02.usersys.redhat.com's Request (ext) - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's Cert  -t u,u,u (ext) --------------------------
certutil -A -n buildnss02.usersys.redhat.com -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -f ../tests.pw -i buildnss02.usersys.redhat.com.cert
cert.sh: #4074: Import buildnss02.usersys.redhat.com's Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n clientCA -t T,, -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA/clientCA.ca.cert
cert.sh: #4075: Import Client Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Generate EC Cert Request for buildnss02.usersys.redhat.com (ext) --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4076: Generate EC Cert Request for buildnss02.usersys.redhat.com (ext) - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -i req -o buildnss02.usersys.redhat.com-ec.cert -f ../tests.pw
cert.sh: #4077: Sign buildnss02.usersys.redhat.com's EC Request (ext) - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's EC Cert  -t u,u,u (ext) --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -f ../tests.pw -i buildnss02.usersys.redhat.com-ec.cert
cert.sh: #4078: Import buildnss02.usersys.redhat.com's EC Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client EC Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA/clientCA-ec.ca.cert
cert.sh: #4079: Import Client EC Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com (ext) --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4080: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com (ext) - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 201 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA -i req -o buildnss02.usersys.redhat.com-ecmixed.cert -f ../tests.pw
cert.sh: #4081: Sign buildnss02.usersys.redhat.com's mixed EC Request (ext) - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's mixed EC Cert  -t u,u,u (ext) --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -f ../tests.pw -i buildnss02.usersys.redhat.com-ecmixed.cert
cert.sh: #4082: Import buildnss02.usersys.redhat.com's mixed EC Cert  -t u,u,u (ext) - PASSED
Importing all the server's own CA chain into the servers DB
cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA/chain-2-serverCA-ec.ca.cert
cert.sh: #4083: Import chain-2-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import chain-1-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA/chain-1-serverCA.ca.cert
cert.sh: #4084: Import chain-1-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import serverCA CA -t C,C,C for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA/serverCA.ca.cert
cert.sh: #4085: Import serverCA CA -t C,C,C for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import chain-2-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA/chain-2-serverCA.ca.cert
cert.sh: #4086: Import chain-2-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import serverCA-ec CA -t C,C,C for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA/serverCA-ec.ca.cert
cert.sh: #4087: Import serverCA-ec CA -t C,C,C for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA/chain-1-serverCA-ec.ca.cert
cert.sh: #4088: Import chain-1-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  - PASSED
Client Cert
cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -f ../tests.pw
cert.sh: #4089: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4090: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4091: Generate Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 300 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw
cert.sh: #4092: Sign ExtendedSSLUser's Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser.cert
cert.sh: #4093: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA/serverCA.ca.cert
cert.sh: #4094: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4095: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw
cert.sh: #4096: Sign ExtendedSSLUser's EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert
cert.sh: #4097: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA/serverCA-ec.ca.cert
cert.sh: #4098: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4099: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 301 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw
cert.sh: #4100: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert
cert.sh: #4101: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED
Importing all the client's own CA chain into the servers DB
cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA/chain-2-clientCA-ec.ca.cert
cert.sh: #4102: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA/clientCA.ca.cert
cert.sh: #4103: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA/chain-2-clientCA.ca.cert
cert.sh: #4104: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA/clientCA-ec.ca.cert
cert.sh: #4105: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA/chain-1-clientCA-ec.ca.cert
cert.sh: #4106: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/clientCA/chain-1-clientCA.ca.cert
cert.sh: #4107: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh SUCCESS: EXT passed
cert.sh: Creating Client CA Issued Certificates ===============
cert.sh: Initializing TestUser's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw
cert.sh: #4108: Initializing TestUser's Cert DB - PASSED
cert.sh: Loading root cert module to TestUser's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4109: Loading root cert module to TestUser's Cert DB - PASSED
cert.sh: Import Root CA for TestUser --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -i ../CA/TestCA.ca.cert
cert.sh: #4110: Import Root CA for TestUser - PASSED
cert.sh: Import EC Root CA for TestUser --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -i ../CA/TestCA-ec.ca.cert
cert.sh: #4111: Import EC Root CA for TestUser - PASSED
cert.sh: Generate Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4112: Generate Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's Request --------------------------
certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw 
cert.sh: #4113: Sign TestUser's Request - PASSED
cert.sh: Import TestUser's Cert --------------------------
certutil -A -n TestUser -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser.cert
cert.sh: #4114: Import TestUser's Cert - PASSED
cert.sh SUCCESS: TestUser's Cert Created
cert.sh: Generate EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4115: Generate EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request --------------------------
certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw 
cert.sh: #4116: Sign TestUser's EC Request - PASSED
cert.sh: Import TestUser's EC Cert --------------------------
certutil -A -n TestUser-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser-ec.cert
cert.sh: #4117: Import TestUser's EC Cert - PASSED
cert.sh SUCCESS: TestUser's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4118: Generate mixed EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw 
cert.sh: #4119: Sign TestUser's EC Request with RSA - PASSED
cert.sh: Import TestUser's mixed EC Cert --------------------------
certutil -A -n TestUser-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser-ecmixed.cert
cert.sh: #4120: Import TestUser's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
             buildnss02.usersys.redhat.com ------------------------------------
cert.sh: Initializing buildnss02.usersys.redhat.com's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw
cert.sh: #4121: Initializing buildnss02.usersys.redhat.com's Cert DB - PASSED
cert.sh: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4122: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB - PASSED
cert.sh: Import Root CA for buildnss02.usersys.redhat.com --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -i ../CA/TestCA.ca.cert
cert.sh: #4123: Import Root CA for buildnss02.usersys.redhat.com - PASSED
cert.sh: Import EC Root CA for buildnss02.usersys.redhat.com --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -i ../CA/TestCA-ec.ca.cert
cert.sh: #4124: Import EC Root CA for buildnss02.usersys.redhat.com - PASSED
cert.sh: Generate Cert Request for buildnss02.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4125: Generate Cert Request for buildnss02.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's Request --------------------------
certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o buildnss02.usersys.redhat.com.cert -f ../tests.pw 
cert.sh: #4126: Sign buildnss02.usersys.redhat.com's Request - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's Cert --------------------------
certutil -A -n buildnss02.usersys.redhat.com -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -i buildnss02.usersys.redhat.com.cert
cert.sh: #4127: Import buildnss02.usersys.redhat.com's Cert - PASSED
cert.sh SUCCESS: buildnss02.usersys.redhat.com's Cert Created
cert.sh: Generate EC Cert Request for buildnss02.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4128: Generate EC Cert Request for buildnss02.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's EC Request --------------------------
certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o buildnss02.usersys.redhat.com-ec.cert -f ../tests.pw 
cert.sh: #4129: Sign buildnss02.usersys.redhat.com's EC Request - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's EC Cert --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -i buildnss02.usersys.redhat.com-ec.cert
cert.sh: #4130: Import buildnss02.usersys.redhat.com's EC Cert - PASSED
cert.sh SUCCESS: buildnss02.usersys.redhat.com's EC Cert Created
cert.sh: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4131: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o buildnss02.usersys.redhat.com-ecmixed.cert -f ../tests.pw 
cert.sh: #4132: Sign buildnss02.usersys.redhat.com's EC Request with RSA - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's mixed EC Cert --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -i buildnss02.usersys.redhat.com-ecmixed.cert
cert.sh: #4133: Import buildnss02.usersys.redhat.com's mixed EC Cert - PASSED
cert.sh SUCCESS: buildnss02.usersys.redhat.com's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
             buildnss02.usersys.redhat.com-sni --------------------------------
cert.sh: Generate Cert Request for buildnss02-sni.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02-sni.usersys.redhat.com, E=buildnss02-sni.usersys.redhat.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4134: Generate Cert Request for buildnss02-sni.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02-sni.usersys.redhat.com's Request --------------------------
certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o buildnss02-sni.usersys.redhat.com.cert -f ../tests.pw 
cert.sh: #4135: Sign buildnss02-sni.usersys.redhat.com's Request - PASSED
cert.sh: Import buildnss02-sni.usersys.redhat.com's Cert --------------------------
certutil -A -n buildnss02-sni.usersys.redhat.com -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -i buildnss02-sni.usersys.redhat.com.cert
cert.sh: #4136: Import buildnss02-sni.usersys.redhat.com's Cert - PASSED
cert.sh SUCCESS: buildnss02-sni.usersys.redhat.com's Cert Created
cert.sh: Generate EC Cert Request for buildnss02-sni.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02-sni.usersys.redhat.com, E=buildnss02-sni.usersys.redhat.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4137: Generate EC Cert Request for buildnss02-sni.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02-sni.usersys.redhat.com's EC Request --------------------------
certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o buildnss02-sni.usersys.redhat.com-ec.cert -f ../tests.pw 
cert.sh: #4138: Sign buildnss02-sni.usersys.redhat.com's EC Request - PASSED
cert.sh: Import buildnss02-sni.usersys.redhat.com's EC Cert --------------------------
certutil -A -n buildnss02-sni.usersys.redhat.com-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -i buildnss02-sni.usersys.redhat.com-ec.cert
cert.sh: #4139: Import buildnss02-sni.usersys.redhat.com's EC Cert - PASSED
cert.sh SUCCESS: buildnss02-sni.usersys.redhat.com's EC Cert Created
cert.sh: Generate mixed EC Cert Request for buildnss02-sni.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02-sni.usersys.redhat.com, E=buildnss02-sni.usersys.redhat.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4140: Generate mixed EC Cert Request for buildnss02-sni.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02-sni.usersys.redhat.com's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o buildnss02-sni.usersys.redhat.com-ecmixed.cert -f ../tests.pw 
cert.sh: #4141: Sign buildnss02-sni.usersys.redhat.com's EC Request with RSA - PASSED
cert.sh: Import buildnss02-sni.usersys.redhat.com's mixed EC Cert --------------------------
certutil -A -n buildnss02-sni.usersys.redhat.com-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw -i buildnss02-sni.usersys.redhat.com-ecmixed.cert
cert.sh: #4142: Import buildnss02-sni.usersys.redhat.com's mixed EC Cert - PASSED
cert.sh SUCCESS: buildnss02-sni.usersys.redhat.com's mixed EC Cert Created
cert.sh: Modify trust attributes of Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA -t TC,TC,TC -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw
cert.sh: #4143: Modify trust attributes of Root CA -t TC,TC,TC - PASSED
cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA-ec -t TC,TC,TC -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server -f ../tests.pw
cert.sh: #4144: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED
cert.sh SUCCESS: SSL passed
cert.sh: Creating Client CA Issued Certificates ==============
cert.sh: Initializing Alice's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -f ../tests.pw
cert.sh: #4145: Initializing Alice's Cert DB - PASSED
cert.sh: Loading root cert module to Alice's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/alicedir

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4146: Loading root cert module to Alice's Cert DB - PASSED
cert.sh: Import Root CA for Alice --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -i ../CA/TestCA.ca.cert
cert.sh: #4147: Import Root CA for Alice - PASSED
cert.sh: Import EC Root CA for Alice --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -i ../CA/TestCA-ec.ca.cert
cert.sh: #4148: Import EC Root CA for Alice - PASSED
cert.sh: Generate Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4149: Generate Cert Request for Alice - PASSED
cert.sh: Sign Alice's Request --------------------------
certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw 
cert.sh: #4150: Sign Alice's Request - PASSED
cert.sh: Import Alice's Cert --------------------------
certutil -A -n Alice -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -f ../tests.pw -i Alice.cert
cert.sh: #4151: Import Alice's Cert - PASSED
cert.sh SUCCESS: Alice's Cert Created
cert.sh: Generate EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4152: Generate EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request --------------------------
certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw 
cert.sh: #4153: Sign Alice's EC Request - PASSED
cert.sh: Import Alice's EC Cert --------------------------
certutil -A -n Alice-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -f ../tests.pw -i Alice-ec.cert
cert.sh: #4154: Import Alice's EC Cert - PASSED
cert.sh SUCCESS: Alice's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4155: Generate mixed EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw 
cert.sh: #4156: Sign Alice's EC Request with RSA - PASSED
cert.sh: Import Alice's mixed EC Cert --------------------------
certutil -A -n Alice-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/alicedir -f ../tests.pw -i Alice-ecmixed.cert
cert.sh: #4157: Import Alice's mixed EC Cert - PASSED
cert.sh SUCCESS: Alice's mixed EC Cert Created
cert.sh: Initializing Bob's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -f ../tests.pw
cert.sh: #4158: Initializing Bob's Cert DB - PASSED
cert.sh: Loading root cert module to Bob's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/bobdir

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4159: Loading root cert module to Bob's Cert DB - PASSED
cert.sh: Import Root CA for Bob --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -i ../CA/TestCA.ca.cert
cert.sh: #4160: Import Root CA for Bob - PASSED
cert.sh: Import EC Root CA for Bob --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -i ../CA/TestCA-ec.ca.cert
cert.sh: #4161: Import EC Root CA for Bob - PASSED
cert.sh: Generate Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4162: Generate Cert Request for Bob - PASSED
cert.sh: Sign Bob's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw 
cert.sh: #4163: Sign Bob's Request - PASSED
cert.sh: Import Bob's Cert --------------------------
certutil -A -n Bob -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -f ../tests.pw -i Bob.cert
cert.sh: #4164: Import Bob's Cert - PASSED
cert.sh SUCCESS: Bob's Cert Created
cert.sh: Generate EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4165: Generate EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw 
cert.sh: #4166: Sign Bob's EC Request - PASSED
cert.sh: Import Bob's EC Cert --------------------------
certutil -A -n Bob-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -f ../tests.pw -i Bob-ec.cert
cert.sh: #4167: Import Bob's EC Cert - PASSED
cert.sh SUCCESS: Bob's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4168: Generate mixed EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw 
cert.sh: #4169: Sign Bob's EC Request with RSA - PASSED
cert.sh: Import Bob's mixed EC Cert --------------------------
certutil -A -n Bob-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/bobdir -f ../tests.pw -i Bob-ecmixed.cert
cert.sh: #4170: Import Bob's mixed EC Cert - PASSED
cert.sh SUCCESS: Bob's mixed EC Cert Created
cert.sh: Creating Dave's Certificate -------------------------
cert.sh: Initializing Dave's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dave -f ../tests.pw
cert.sh: #4171: Initializing Dave's Cert DB - PASSED
cert.sh: Loading root cert module to Dave's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dave

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4172: Loading root cert module to Dave's Cert DB - PASSED
cert.sh: Import Root CA for Dave --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dave -i ../CA/TestCA.ca.cert
cert.sh: #4173: Import Root CA for Dave - PASSED
cert.sh: Import EC Root CA for Dave --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dave -i ../CA/TestCA-ec.ca.cert
cert.sh: #4174: Import EC Root CA for Dave - PASSED
cert.sh: Generate Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4175: Generate Cert Request for Dave - PASSED
cert.sh: Sign Dave's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw 
cert.sh: #4176: Sign Dave's Request - PASSED
cert.sh: Import Dave's Cert --------------------------
certutil -A -n Dave -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dave -f ../tests.pw -i Dave.cert
cert.sh: #4177: Import Dave's Cert - PASSED
cert.sh SUCCESS: Dave's Cert Created
cert.sh: Generate EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4178: Generate EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw 
cert.sh: #4179: Sign Dave's EC Request - PASSED
cert.sh: Import Dave's EC Cert --------------------------
certutil -A -n Dave-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dave -f ../tests.pw -i Dave-ec.cert
cert.sh: #4180: Import Dave's EC Cert - PASSED
cert.sh SUCCESS: Dave's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4181: Generate mixed EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw 
cert.sh: #4182: Sign Dave's EC Request with RSA - PASSED
cert.sh: Import Dave's mixed EC Cert --------------------------
certutil -A -n Dave-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dave -f ../tests.pw -i Dave-ecmixed.cert
cert.sh: #4183: Import Dave's mixed EC Cert - PASSED
cert.sh SUCCESS: Dave's mixed EC Cert Created
cert.sh: Creating multiEmail's Certificate --------------------
cert.sh: Initializing Eve's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eve -f ../tests.pw
cert.sh: #4184: Initializing Eve's Cert DB - PASSED
cert.sh: Loading root cert module to Eve's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eve

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4185: Loading root cert module to Eve's Cert DB - PASSED
cert.sh: Import Root CA for Eve --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eve -i ../CA/TestCA.ca.cert
cert.sh: #4186: Import Root CA for Eve - PASSED
cert.sh: Import EC Root CA for Eve --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eve -i ../CA/TestCA-ec.ca.cert
cert.sh: #4187: Import EC Root CA for Eve - PASSED
cert.sh: Generate Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4188: Generate Cert Request for Eve - PASSED
cert.sh: Sign Eve's Request --------------------------
certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #4189: Sign Eve's Request - PASSED
cert.sh: Import Eve's Cert --------------------------
certutil -A -n Eve -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eve -f ../tests.pw -i Eve.cert
cert.sh: #4190: Import Eve's Cert - PASSED
cert.sh SUCCESS: Eve's Cert Created
cert.sh: Generate EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4191: Generate EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request --------------------------
certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #4192: Sign Eve's EC Request - PASSED
cert.sh: Import Eve's EC Cert --------------------------
certutil -A -n Eve-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eve -f ../tests.pw -i Eve-ec.cert
cert.sh: #4193: Import Eve's EC Cert - PASSED
cert.sh SUCCESS: Eve's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4194: Generate mixed EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #4195: Sign Eve's EC Request with RSA - PASSED
cert.sh: Import Eve's mixed EC Cert --------------------------
certutil -A -n Eve-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eve -f ../tests.pw -i Eve-ecmixed.cert
cert.sh: #4196: Import Eve's mixed EC Cert - PASSED
cert.sh SUCCESS: Eve's mixed EC Cert Created
cert.sh: Importing Certificates ==============================
cert.sh: Import Bob's cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert
cert.sh: #4197: Import Bob's cert into Alice's db - PASSED
cert.sh: Import Dave's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #4198: Import Dave's cert into Alice's DB - PASSED
cert.sh: Import Dave's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #4199: Import Dave's cert into Bob's DB - PASSED
cert.sh: Import Eve's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #4200: Import Eve's cert into Alice's DB - PASSED
cert.sh: Import Eve's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #4201: Import Eve's cert into Bob's DB - PASSED
cert.sh: Importing EC Certificates ==============================
cert.sh: Import Bob's EC cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert
cert.sh: #4202: Import Bob's EC cert into Alice's db - PASSED
cert.sh: Import Dave's EC cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #4203: Import Dave's EC cert into Alice's DB - PASSED
cert.sh: Import Dave's EC cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #4204: Import Dave's EC cert into Bob's DB - PASSED
cert.sh SUCCESS: SMIME passed
cert.sh: Creating FIPS 140 DSA Certificates ==============
cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips -f ../tests.fipspw
cert.sh: #4205: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED
cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4206: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED
cert.sh: Enable FIPS mode on database -----------------------
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips -fips true 

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
FIPS mode enabled.
cert.sh: #4207: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED
cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate --------------------------
certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise


Generating key.  This may take a few moments...

cert.sh: #4208: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED
cert.sh SUCCESS: FIPS passed
cert.sh: Creating Server CA Issued Certificate for 
             EC Curves Test Certificates ------------------------------------
cert.sh: Initializing EC Curve's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw
cert.sh: #4209: Initializing EC Curve's Cert DB - PASSED
cert.sh: Loading root cert module to EC Curve's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4210: Loading root cert module to EC Curve's Cert DB - PASSED
cert.sh: Import EC Root CA for EC Curves Test Certificates --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -i ../CA/TestCA-ec.ca.cert
cert.sh: #4211: Import EC Root CA for EC Curves Test Certificates - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v1 --------------------------
certutil -s "CN=Curve-c2pnb163v1, E=Curve-c2pnb163v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4212: Generate EC Cert Request for Curve-c2pnb163v1 - PASSED
cert.sh: Sign Curve-c2pnb163v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-c2pnb163v1-ec.cert -f ../tests.pw 
cert.sh: #4213: Sign Curve-c2pnb163v1's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v1's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb163v1-ec.cert
cert.sh: #4214: Import Curve-c2pnb163v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v2 --------------------------
certutil -s "CN=Curve-c2pnb163v2, E=Curve-c2pnb163v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4215: Generate EC Cert Request for Curve-c2pnb163v2 - PASSED
cert.sh: Sign Curve-c2pnb163v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-c2pnb163v2-ec.cert -f ../tests.pw 
cert.sh: #4216: Sign Curve-c2pnb163v2's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v2's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb163v2-ec.cert
cert.sh: #4217: Import Curve-c2pnb163v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v3 --------------------------
certutil -s "CN=Curve-c2pnb163v3, E=Curve-c2pnb163v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4218: Generate EC Cert Request for Curve-c2pnb163v3 - PASSED
cert.sh: Sign Curve-c2pnb163v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-c2pnb163v3-ec.cert -f ../tests.pw 
cert.sh: #4219: Sign Curve-c2pnb163v3's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v3's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb163v3-ec.cert
cert.sh: #4220: Import Curve-c2pnb163v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb176v1 --------------------------
certutil -s "CN=Curve-c2pnb176v1, E=Curve-c2pnb176v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb176v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4221: Generate EC Cert Request for Curve-c2pnb176v1 - PASSED
cert.sh: Sign Curve-c2pnb176v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2004 -v 60 -d ../CA -i req -o Curve-c2pnb176v1-ec.cert -f ../tests.pw 
cert.sh: #4222: Sign Curve-c2pnb176v1's EC Request - PASSED
cert.sh: Import Curve-c2pnb176v1's EC Cert --------------------------
certutil -A -n Curve-c2pnb176v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb176v1-ec.cert
cert.sh: #4223: Import Curve-c2pnb176v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb208w1 --------------------------
certutil -s "CN=Curve-c2pnb208w1, E=Curve-c2pnb208w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb208w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4224: Generate EC Cert Request for Curve-c2pnb208w1 - PASSED
cert.sh: Sign Curve-c2pnb208w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2005 -v 60 -d ../CA -i req -o Curve-c2pnb208w1-ec.cert -f ../tests.pw 
cert.sh: #4225: Sign Curve-c2pnb208w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb208w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb208w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb208w1-ec.cert
cert.sh: #4226: Import Curve-c2pnb208w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb272w1 --------------------------
certutil -s "CN=Curve-c2pnb272w1, E=Curve-c2pnb272w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb272w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4227: Generate EC Cert Request for Curve-c2pnb272w1 - PASSED
cert.sh: Sign Curve-c2pnb272w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2006 -v 60 -d ../CA -i req -o Curve-c2pnb272w1-ec.cert -f ../tests.pw 
cert.sh: #4228: Sign Curve-c2pnb272w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb272w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb272w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb272w1-ec.cert
cert.sh: #4229: Import Curve-c2pnb272w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb304w1 --------------------------
certutil -s "CN=Curve-c2pnb304w1, E=Curve-c2pnb304w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb304w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4230: Generate EC Cert Request for Curve-c2pnb304w1 - PASSED
cert.sh: Sign Curve-c2pnb304w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2007 -v 60 -d ../CA -i req -o Curve-c2pnb304w1-ec.cert -f ../tests.pw 
cert.sh: #4231: Sign Curve-c2pnb304w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb304w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb304w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb304w1-ec.cert
cert.sh: #4232: Import Curve-c2pnb304w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb368w1 --------------------------
certutil -s "CN=Curve-c2pnb368w1, E=Curve-c2pnb368w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb368w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4233: Generate EC Cert Request for Curve-c2pnb368w1 - PASSED
cert.sh: Sign Curve-c2pnb368w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2008 -v 60 -d ../CA -i req -o Curve-c2pnb368w1-ec.cert -f ../tests.pw 
cert.sh: #4234: Sign Curve-c2pnb368w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb368w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb368w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2pnb368w1-ec.cert
cert.sh: #4235: Import Curve-c2pnb368w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v1 --------------------------
certutil -s "CN=Curve-c2tnb191v1, E=Curve-c2tnb191v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4236: Generate EC Cert Request for Curve-c2tnb191v1 - PASSED
cert.sh: Sign Curve-c2tnb191v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2009 -v 60 -d ../CA -i req -o Curve-c2tnb191v1-ec.cert -f ../tests.pw 
cert.sh: #4237: Sign Curve-c2tnb191v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb191v1-ec.cert
cert.sh: #4238: Import Curve-c2tnb191v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v2 --------------------------
certutil -s "CN=Curve-c2tnb191v2, E=Curve-c2tnb191v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4239: Generate EC Cert Request for Curve-c2tnb191v2 - PASSED
cert.sh: Sign Curve-c2tnb191v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2010 -v 60 -d ../CA -i req -o Curve-c2tnb191v2-ec.cert -f ../tests.pw 
cert.sh: #4240: Sign Curve-c2tnb191v2's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v2's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb191v2-ec.cert
cert.sh: #4241: Import Curve-c2tnb191v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v3 --------------------------
certutil -s "CN=Curve-c2tnb191v3, E=Curve-c2tnb191v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4242: Generate EC Cert Request for Curve-c2tnb191v3 - PASSED
cert.sh: Sign Curve-c2tnb191v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2011 -v 60 -d ../CA -i req -o Curve-c2tnb191v3-ec.cert -f ../tests.pw 
cert.sh: #4243: Sign Curve-c2tnb191v3's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v3's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb191v3-ec.cert
cert.sh: #4244: Import Curve-c2tnb191v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v1 --------------------------
certutil -s "CN=Curve-c2tnb239v1, E=Curve-c2tnb239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4245: Generate EC Cert Request for Curve-c2tnb239v1 - PASSED
cert.sh: Sign Curve-c2tnb239v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2012 -v 60 -d ../CA -i req -o Curve-c2tnb239v1-ec.cert -f ../tests.pw 
cert.sh: #4246: Sign Curve-c2tnb239v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb239v1-ec.cert
cert.sh: #4247: Import Curve-c2tnb239v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v2 --------------------------
certutil -s "CN=Curve-c2tnb239v2, E=Curve-c2tnb239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4248: Generate EC Cert Request for Curve-c2tnb239v2 - PASSED
cert.sh: Sign Curve-c2tnb239v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2013 -v 60 -d ../CA -i req -o Curve-c2tnb239v2-ec.cert -f ../tests.pw 
cert.sh: #4249: Sign Curve-c2tnb239v2's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v2's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb239v2-ec.cert
cert.sh: #4250: Import Curve-c2tnb239v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v3 --------------------------
certutil -s "CN=Curve-c2tnb239v3, E=Curve-c2tnb239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4251: Generate EC Cert Request for Curve-c2tnb239v3 - PASSED
cert.sh: Sign Curve-c2tnb239v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2014 -v 60 -d ../CA -i req -o Curve-c2tnb239v3-ec.cert -f ../tests.pw 
cert.sh: #4252: Sign Curve-c2tnb239v3's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v3's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb239v3-ec.cert
cert.sh: #4253: Import Curve-c2tnb239v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb359v1 --------------------------
certutil -s "CN=Curve-c2tnb359v1, E=Curve-c2tnb359v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb359v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4254: Generate EC Cert Request for Curve-c2tnb359v1 - PASSED
cert.sh: Sign Curve-c2tnb359v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2015 -v 60 -d ../CA -i req -o Curve-c2tnb359v1-ec.cert -f ../tests.pw 
cert.sh: #4255: Sign Curve-c2tnb359v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb359v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb359v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb359v1-ec.cert
cert.sh: #4256: Import Curve-c2tnb359v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb431r1 --------------------------
certutil -s "CN=Curve-c2tnb431r1, E=Curve-c2tnb431r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb431r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4257: Generate EC Cert Request for Curve-c2tnb431r1 - PASSED
cert.sh: Sign Curve-c2tnb431r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2016 -v 60 -d ../CA -i req -o Curve-c2tnb431r1-ec.cert -f ../tests.pw 
cert.sh: #4258: Sign Curve-c2tnb431r1's EC Request - PASSED
cert.sh: Import Curve-c2tnb431r1's EC Cert --------------------------
certutil -A -n Curve-c2tnb431r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-c2tnb431r1-ec.cert
cert.sh: #4259: Import Curve-c2tnb431r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb163 --------------------------
certutil -s "CN=Curve-nistb163, E=Curve-nistb163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb163 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4260: Generate EC Cert Request for Curve-nistb163 - PASSED
cert.sh: Sign Curve-nistb163's EC Request --------------------------
certutil -C -c TestCA-ec -m 2017 -v 60 -d ../CA -i req -o Curve-nistb163-ec.cert -f ../tests.pw 
cert.sh: #4261: Sign Curve-nistb163's EC Request - PASSED
cert.sh: Import Curve-nistb163's EC Cert --------------------------
certutil -A -n Curve-nistb163-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistb163-ec.cert
cert.sh: #4262: Import Curve-nistb163's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb233 --------------------------
certutil -s "CN=Curve-nistb233, E=Curve-nistb233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb233 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4263: Generate EC Cert Request for Curve-nistb233 - PASSED
cert.sh: Sign Curve-nistb233's EC Request --------------------------
certutil -C -c TestCA-ec -m 2018 -v 60 -d ../CA -i req -o Curve-nistb233-ec.cert -f ../tests.pw 
cert.sh: #4264: Sign Curve-nistb233's EC Request - PASSED
cert.sh: Import Curve-nistb233's EC Cert --------------------------
certutil -A -n Curve-nistb233-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistb233-ec.cert
cert.sh: #4265: Import Curve-nistb233's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb283 --------------------------
certutil -s "CN=Curve-nistb283, E=Curve-nistb283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb283 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4266: Generate EC Cert Request for Curve-nistb283 - PASSED
cert.sh: Sign Curve-nistb283's EC Request --------------------------
certutil -C -c TestCA-ec -m 2019 -v 60 -d ../CA -i req -o Curve-nistb283-ec.cert -f ../tests.pw 
cert.sh: #4267: Sign Curve-nistb283's EC Request - PASSED
cert.sh: Import Curve-nistb283's EC Cert --------------------------
certutil -A -n Curve-nistb283-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistb283-ec.cert
cert.sh: #4268: Import Curve-nistb283's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb409 --------------------------
certutil -s "CN=Curve-nistb409, E=Curve-nistb409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb409 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4269: Generate EC Cert Request for Curve-nistb409 - PASSED
cert.sh: Sign Curve-nistb409's EC Request --------------------------
certutil -C -c TestCA-ec -m 2020 -v 60 -d ../CA -i req -o Curve-nistb409-ec.cert -f ../tests.pw 
cert.sh: #4270: Sign Curve-nistb409's EC Request - PASSED
cert.sh: Import Curve-nistb409's EC Cert --------------------------
certutil -A -n Curve-nistb409-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistb409-ec.cert
cert.sh: #4271: Import Curve-nistb409's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb571 --------------------------
certutil -s "CN=Curve-nistb571, E=Curve-nistb571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb571 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4272: Generate EC Cert Request for Curve-nistb571 - PASSED
cert.sh: Sign Curve-nistb571's EC Request --------------------------
certutil -C -c TestCA-ec -m 2021 -v 60 -d ../CA -i req -o Curve-nistb571-ec.cert -f ../tests.pw 
cert.sh: #4273: Sign Curve-nistb571's EC Request - PASSED
cert.sh: Import Curve-nistb571's EC Cert --------------------------
certutil -A -n Curve-nistb571-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistb571-ec.cert
cert.sh: #4274: Import Curve-nistb571's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk163 --------------------------
certutil -s "CN=Curve-nistk163, E=Curve-nistk163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk163 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4275: Generate EC Cert Request for Curve-nistk163 - PASSED
cert.sh: Sign Curve-nistk163's EC Request --------------------------
certutil -C -c TestCA-ec -m 2022 -v 60 -d ../CA -i req -o Curve-nistk163-ec.cert -f ../tests.pw 
cert.sh: #4276: Sign Curve-nistk163's EC Request - PASSED
cert.sh: Import Curve-nistk163's EC Cert --------------------------
certutil -A -n Curve-nistk163-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistk163-ec.cert
cert.sh: #4277: Import Curve-nistk163's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk233 --------------------------
certutil -s "CN=Curve-nistk233, E=Curve-nistk233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk233 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4278: Generate EC Cert Request for Curve-nistk233 - PASSED
cert.sh: Sign Curve-nistk233's EC Request --------------------------
certutil -C -c TestCA-ec -m 2023 -v 60 -d ../CA -i req -o Curve-nistk233-ec.cert -f ../tests.pw 
cert.sh: #4279: Sign Curve-nistk233's EC Request - PASSED
cert.sh: Import Curve-nistk233's EC Cert --------------------------
certutil -A -n Curve-nistk233-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistk233-ec.cert
cert.sh: #4280: Import Curve-nistk233's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk283 --------------------------
certutil -s "CN=Curve-nistk283, E=Curve-nistk283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk283 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4281: Generate EC Cert Request for Curve-nistk283 - PASSED
cert.sh: Sign Curve-nistk283's EC Request --------------------------
certutil -C -c TestCA-ec -m 2024 -v 60 -d ../CA -i req -o Curve-nistk283-ec.cert -f ../tests.pw 
cert.sh: #4282: Sign Curve-nistk283's EC Request - PASSED
cert.sh: Import Curve-nistk283's EC Cert --------------------------
certutil -A -n Curve-nistk283-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistk283-ec.cert
cert.sh: #4283: Import Curve-nistk283's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk409 --------------------------
certutil -s "CN=Curve-nistk409, E=Curve-nistk409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk409 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4284: Generate EC Cert Request for Curve-nistk409 - PASSED
cert.sh: Sign Curve-nistk409's EC Request --------------------------
certutil -C -c TestCA-ec -m 2025 -v 60 -d ../CA -i req -o Curve-nistk409-ec.cert -f ../tests.pw 
cert.sh: #4285: Sign Curve-nistk409's EC Request - PASSED
cert.sh: Import Curve-nistk409's EC Cert --------------------------
certutil -A -n Curve-nistk409-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistk409-ec.cert
cert.sh: #4286: Import Curve-nistk409's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk571 --------------------------
certutil -s "CN=Curve-nistk571, E=Curve-nistk571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk571 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4287: Generate EC Cert Request for Curve-nistk571 - PASSED
cert.sh: Sign Curve-nistk571's EC Request --------------------------
certutil -C -c TestCA-ec -m 2026 -v 60 -d ../CA -i req -o Curve-nistk571-ec.cert -f ../tests.pw 
cert.sh: #4288: Sign Curve-nistk571's EC Request - PASSED
cert.sh: Import Curve-nistk571's EC Cert --------------------------
certutil -A -n Curve-nistk571-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistk571-ec.cert
cert.sh: #4289: Import Curve-nistk571's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp192 --------------------------
certutil -s "CN=Curve-nistp192, E=Curve-nistp192-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp192 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4290: Generate EC Cert Request for Curve-nistp192 - PASSED
cert.sh: Sign Curve-nistp192's EC Request --------------------------
certutil -C -c TestCA-ec -m 2027 -v 60 -d ../CA -i req -o Curve-nistp192-ec.cert -f ../tests.pw 
cert.sh: #4291: Sign Curve-nistp192's EC Request - PASSED
cert.sh: Import Curve-nistp192's EC Cert --------------------------
certutil -A -n Curve-nistp192-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistp192-ec.cert
cert.sh: #4292: Import Curve-nistp192's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp224 --------------------------
certutil -s "CN=Curve-nistp224, E=Curve-nistp224-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp224 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4293: Generate EC Cert Request for Curve-nistp224 - PASSED
cert.sh: Sign Curve-nistp224's EC Request --------------------------
certutil -C -c TestCA-ec -m 2028 -v 60 -d ../CA -i req -o Curve-nistp224-ec.cert -f ../tests.pw 
cert.sh: #4294: Sign Curve-nistp224's EC Request - PASSED
cert.sh: Import Curve-nistp224's EC Cert --------------------------
certutil -A -n Curve-nistp224-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistp224-ec.cert
cert.sh: #4295: Import Curve-nistp224's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp256 --------------------------
certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4296: Generate EC Cert Request for Curve-nistp256 - PASSED
cert.sh: Sign Curve-nistp256's EC Request --------------------------
certutil -C -c TestCA-ec -m 2029 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw 
cert.sh: #4297: Sign Curve-nistp256's EC Request - PASSED
cert.sh: Import Curve-nistp256's EC Cert --------------------------
certutil -A -n Curve-nistp256-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert
cert.sh: #4298: Import Curve-nistp256's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp384 --------------------------
certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4299: Generate EC Cert Request for Curve-nistp384 - PASSED
cert.sh: Sign Curve-nistp384's EC Request --------------------------
certutil -C -c TestCA-ec -m 2030 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw 
cert.sh: #4300: Sign Curve-nistp384's EC Request - PASSED
cert.sh: Import Curve-nistp384's EC Cert --------------------------
certutil -A -n Curve-nistp384-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert
cert.sh: #4301: Import Curve-nistp384's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp521 --------------------------
certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4302: Generate EC Cert Request for Curve-nistp521 - PASSED
cert.sh: Sign Curve-nistp521's EC Request --------------------------
certutil -C -c TestCA-ec -m 2031 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw 
cert.sh: #4303: Sign Curve-nistp521's EC Request - PASSED
cert.sh: Import Curve-nistp521's EC Cert --------------------------
certutil -A -n Curve-nistp521-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert
cert.sh: #4304: Import Curve-nistp521's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v1 --------------------------
certutil -s "CN=Curve-prime192v1, E=Curve-prime192v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4305: Generate EC Cert Request for Curve-prime192v1 - PASSED
cert.sh: Sign Curve-prime192v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2032 -v 60 -d ../CA -i req -o Curve-prime192v1-ec.cert -f ../tests.pw 
cert.sh: #4306: Sign Curve-prime192v1's EC Request - PASSED
cert.sh: Import Curve-prime192v1's EC Cert --------------------------
certutil -A -n Curve-prime192v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-prime192v1-ec.cert
cert.sh: #4307: Import Curve-prime192v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v2 --------------------------
certutil -s "CN=Curve-prime192v2, E=Curve-prime192v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4308: Generate EC Cert Request for Curve-prime192v2 - PASSED
cert.sh: Sign Curve-prime192v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2033 -v 60 -d ../CA -i req -o Curve-prime192v2-ec.cert -f ../tests.pw 
cert.sh: #4309: Sign Curve-prime192v2's EC Request - PASSED
cert.sh: Import Curve-prime192v2's EC Cert --------------------------
certutil -A -n Curve-prime192v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-prime192v2-ec.cert
cert.sh: #4310: Import Curve-prime192v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v3 --------------------------
certutil -s "CN=Curve-prime192v3, E=Curve-prime192v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4311: Generate EC Cert Request for Curve-prime192v3 - PASSED
cert.sh: Sign Curve-prime192v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2034 -v 60 -d ../CA -i req -o Curve-prime192v3-ec.cert -f ../tests.pw 
cert.sh: #4312: Sign Curve-prime192v3's EC Request - PASSED
cert.sh: Import Curve-prime192v3's EC Cert --------------------------
certutil -A -n Curve-prime192v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-prime192v3-ec.cert
cert.sh: #4313: Import Curve-prime192v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v1 --------------------------
certutil -s "CN=Curve-prime239v1, E=Curve-prime239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4314: Generate EC Cert Request for Curve-prime239v1 - PASSED
cert.sh: Sign Curve-prime239v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2035 -v 60 -d ../CA -i req -o Curve-prime239v1-ec.cert -f ../tests.pw 
cert.sh: #4315: Sign Curve-prime239v1's EC Request - PASSED
cert.sh: Import Curve-prime239v1's EC Cert --------------------------
certutil -A -n Curve-prime239v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-prime239v1-ec.cert
cert.sh: #4316: Import Curve-prime239v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v2 --------------------------
certutil -s "CN=Curve-prime239v2, E=Curve-prime239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4317: Generate EC Cert Request for Curve-prime239v2 - PASSED
cert.sh: Sign Curve-prime239v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2036 -v 60 -d ../CA -i req -o Curve-prime239v2-ec.cert -f ../tests.pw 
cert.sh: #4318: Sign Curve-prime239v2's EC Request - PASSED
cert.sh: Import Curve-prime239v2's EC Cert --------------------------
certutil -A -n Curve-prime239v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-prime239v2-ec.cert
cert.sh: #4319: Import Curve-prime239v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v3 --------------------------
certutil -s "CN=Curve-prime239v3, E=Curve-prime239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4320: Generate EC Cert Request for Curve-prime239v3 - PASSED
cert.sh: Sign Curve-prime239v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2037 -v 60 -d ../CA -i req -o Curve-prime239v3-ec.cert -f ../tests.pw 
cert.sh: #4321: Sign Curve-prime239v3's EC Request - PASSED
cert.sh: Import Curve-prime239v3's EC Cert --------------------------
certutil -A -n Curve-prime239v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-prime239v3-ec.cert
cert.sh: #4322: Import Curve-prime239v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp112r1 --------------------------
certutil -s "CN=Curve-secp112r1, E=Curve-secp112r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4323: Generate EC Cert Request for Curve-secp112r1 - PASSED
cert.sh: Sign Curve-secp112r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2038 -v 60 -d ../CA -i req -o Curve-secp112r1-ec.cert -f ../tests.pw 
cert.sh: #4324: Sign Curve-secp112r1's EC Request - PASSED
cert.sh: Import Curve-secp112r1's EC Cert --------------------------
certutil -A -n Curve-secp112r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp112r1-ec.cert
cert.sh: #4325: Import Curve-secp112r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp112r2 --------------------------
certutil -s "CN=Curve-secp112r2, E=Curve-secp112r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4326: Generate EC Cert Request for Curve-secp112r2 - PASSED
cert.sh: Sign Curve-secp112r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2039 -v 60 -d ../CA -i req -o Curve-secp112r2-ec.cert -f ../tests.pw 
cert.sh: #4327: Sign Curve-secp112r2's EC Request - PASSED
cert.sh: Import Curve-secp112r2's EC Cert --------------------------
certutil -A -n Curve-secp112r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp112r2-ec.cert
cert.sh: #4328: Import Curve-secp112r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp128r1 --------------------------
certutil -s "CN=Curve-secp128r1, E=Curve-secp128r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4329: Generate EC Cert Request for Curve-secp128r1 - PASSED
cert.sh: Sign Curve-secp128r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2040 -v 60 -d ../CA -i req -o Curve-secp128r1-ec.cert -f ../tests.pw 
cert.sh: #4330: Sign Curve-secp128r1's EC Request - PASSED
cert.sh: Import Curve-secp128r1's EC Cert --------------------------
certutil -A -n Curve-secp128r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp128r1-ec.cert
cert.sh: #4331: Import Curve-secp128r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp128r2 --------------------------
certutil -s "CN=Curve-secp128r2, E=Curve-secp128r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4332: Generate EC Cert Request for Curve-secp128r2 - PASSED
cert.sh: Sign Curve-secp128r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2041 -v 60 -d ../CA -i req -o Curve-secp128r2-ec.cert -f ../tests.pw 
cert.sh: #4333: Sign Curve-secp128r2's EC Request - PASSED
cert.sh: Import Curve-secp128r2's EC Cert --------------------------
certutil -A -n Curve-secp128r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp128r2-ec.cert
cert.sh: #4334: Import Curve-secp128r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160k1 --------------------------
certutil -s "CN=Curve-secp160k1, E=Curve-secp160k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4335: Generate EC Cert Request for Curve-secp160k1 - PASSED
cert.sh: Sign Curve-secp160k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2042 -v 60 -d ../CA -i req -o Curve-secp160k1-ec.cert -f ../tests.pw 
cert.sh: #4336: Sign Curve-secp160k1's EC Request - PASSED
cert.sh: Import Curve-secp160k1's EC Cert --------------------------
certutil -A -n Curve-secp160k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp160k1-ec.cert
cert.sh: #4337: Import Curve-secp160k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160r1 --------------------------
certutil -s "CN=Curve-secp160r1, E=Curve-secp160r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4338: Generate EC Cert Request for Curve-secp160r1 - PASSED
cert.sh: Sign Curve-secp160r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2043 -v 60 -d ../CA -i req -o Curve-secp160r1-ec.cert -f ../tests.pw 
cert.sh: #4339: Sign Curve-secp160r1's EC Request - PASSED
cert.sh: Import Curve-secp160r1's EC Cert --------------------------
certutil -A -n Curve-secp160r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp160r1-ec.cert
cert.sh: #4340: Import Curve-secp160r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160r2 --------------------------
certutil -s "CN=Curve-secp160r2, E=Curve-secp160r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4341: Generate EC Cert Request for Curve-secp160r2 - PASSED
cert.sh: Sign Curve-secp160r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2044 -v 60 -d ../CA -i req -o Curve-secp160r2-ec.cert -f ../tests.pw 
cert.sh: #4342: Sign Curve-secp160r2's EC Request - PASSED
cert.sh: Import Curve-secp160r2's EC Cert --------------------------
certutil -A -n Curve-secp160r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp160r2-ec.cert
cert.sh: #4343: Import Curve-secp160r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp192k1 --------------------------
certutil -s "CN=Curve-secp192k1, E=Curve-secp192k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4344: Generate EC Cert Request for Curve-secp192k1 - PASSED
cert.sh: Sign Curve-secp192k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2045 -v 60 -d ../CA -i req -o Curve-secp192k1-ec.cert -f ../tests.pw 
cert.sh: #4345: Sign Curve-secp192k1's EC Request - PASSED
cert.sh: Import Curve-secp192k1's EC Cert --------------------------
certutil -A -n Curve-secp192k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp192k1-ec.cert
cert.sh: #4346: Import Curve-secp192k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp192r1 --------------------------
certutil -s "CN=Curve-secp192r1, E=Curve-secp192r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4347: Generate EC Cert Request for Curve-secp192r1 - PASSED
cert.sh: Sign Curve-secp192r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2046 -v 60 -d ../CA -i req -o Curve-secp192r1-ec.cert -f ../tests.pw 
cert.sh: #4348: Sign Curve-secp192r1's EC Request - PASSED
cert.sh: Import Curve-secp192r1's EC Cert --------------------------
certutil -A -n Curve-secp192r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp192r1-ec.cert
cert.sh: #4349: Import Curve-secp192r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp224k1 --------------------------
certutil -s "CN=Curve-secp224k1, E=Curve-secp224k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4350: Generate EC Cert Request for Curve-secp224k1 - PASSED
cert.sh: Sign Curve-secp224k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2047 -v 60 -d ../CA -i req -o Curve-secp224k1-ec.cert -f ../tests.pw 
cert.sh: #4351: Sign Curve-secp224k1's EC Request - PASSED
cert.sh: Import Curve-secp224k1's EC Cert --------------------------
certutil -A -n Curve-secp224k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp224k1-ec.cert
cert.sh: #4352: Import Curve-secp224k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp224r1 --------------------------
certutil -s "CN=Curve-secp224r1, E=Curve-secp224r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4353: Generate EC Cert Request for Curve-secp224r1 - PASSED
cert.sh: Sign Curve-secp224r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2048 -v 60 -d ../CA -i req -o Curve-secp224r1-ec.cert -f ../tests.pw 
cert.sh: #4354: Sign Curve-secp224r1's EC Request - PASSED
cert.sh: Import Curve-secp224r1's EC Cert --------------------------
certutil -A -n Curve-secp224r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp224r1-ec.cert
cert.sh: #4355: Import Curve-secp224r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp256k1 --------------------------
certutil -s "CN=Curve-secp256k1, E=Curve-secp256k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4356: Generate EC Cert Request for Curve-secp256k1 - PASSED
cert.sh: Sign Curve-secp256k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2049 -v 60 -d ../CA -i req -o Curve-secp256k1-ec.cert -f ../tests.pw 
cert.sh: #4357: Sign Curve-secp256k1's EC Request - PASSED
cert.sh: Import Curve-secp256k1's EC Cert --------------------------
certutil -A -n Curve-secp256k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp256k1-ec.cert
cert.sh: #4358: Import Curve-secp256k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp256r1 --------------------------
certutil -s "CN=Curve-secp256r1, E=Curve-secp256r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4359: Generate EC Cert Request for Curve-secp256r1 - PASSED
cert.sh: Sign Curve-secp256r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2050 -v 60 -d ../CA -i req -o Curve-secp256r1-ec.cert -f ../tests.pw 
cert.sh: #4360: Sign Curve-secp256r1's EC Request - PASSED
cert.sh: Import Curve-secp256r1's EC Cert --------------------------
certutil -A -n Curve-secp256r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp256r1-ec.cert
cert.sh: #4361: Import Curve-secp256r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp384r1 --------------------------
certutil -s "CN=Curve-secp384r1, E=Curve-secp384r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4362: Generate EC Cert Request for Curve-secp384r1 - PASSED
cert.sh: Sign Curve-secp384r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2051 -v 60 -d ../CA -i req -o Curve-secp384r1-ec.cert -f ../tests.pw 
cert.sh: #4363: Sign Curve-secp384r1's EC Request - PASSED
cert.sh: Import Curve-secp384r1's EC Cert --------------------------
certutil -A -n Curve-secp384r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp384r1-ec.cert
cert.sh: #4364: Import Curve-secp384r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp521r1 --------------------------
certutil -s "CN=Curve-secp521r1, E=Curve-secp521r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp521r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4365: Generate EC Cert Request for Curve-secp521r1 - PASSED
cert.sh: Sign Curve-secp521r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2052 -v 60 -d ../CA -i req -o Curve-secp521r1-ec.cert -f ../tests.pw 
cert.sh: #4366: Sign Curve-secp521r1's EC Request - PASSED
cert.sh: Import Curve-secp521r1's EC Cert --------------------------
certutil -A -n Curve-secp521r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-secp521r1-ec.cert
cert.sh: #4367: Import Curve-secp521r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect113r1 --------------------------
certutil -s "CN=Curve-sect113r1, E=Curve-sect113r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4368: Generate EC Cert Request for Curve-sect113r1 - PASSED
cert.sh: Sign Curve-sect113r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2053 -v 60 -d ../CA -i req -o Curve-sect113r1-ec.cert -f ../tests.pw 
cert.sh: #4369: Sign Curve-sect113r1's EC Request - PASSED
cert.sh: Import Curve-sect113r1's EC Cert --------------------------
certutil -A -n Curve-sect113r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect113r1-ec.cert
cert.sh: #4370: Import Curve-sect113r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect113r2 --------------------------
certutil -s "CN=Curve-sect113r2, E=Curve-sect113r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4371: Generate EC Cert Request for Curve-sect113r2 - PASSED
cert.sh: Sign Curve-sect113r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2054 -v 60 -d ../CA -i req -o Curve-sect113r2-ec.cert -f ../tests.pw 
cert.sh: #4372: Sign Curve-sect113r2's EC Request - PASSED
cert.sh: Import Curve-sect113r2's EC Cert --------------------------
certutil -A -n Curve-sect113r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect113r2-ec.cert
cert.sh: #4373: Import Curve-sect113r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect131r1 --------------------------
certutil -s "CN=Curve-sect131r1, E=Curve-sect131r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4374: Generate EC Cert Request for Curve-sect131r1 - PASSED
cert.sh: Sign Curve-sect131r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2055 -v 60 -d ../CA -i req -o Curve-sect131r1-ec.cert -f ../tests.pw 
cert.sh: #4375: Sign Curve-sect131r1's EC Request - PASSED
cert.sh: Import Curve-sect131r1's EC Cert --------------------------
certutil -A -n Curve-sect131r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect131r1-ec.cert
cert.sh: #4376: Import Curve-sect131r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect131r2 --------------------------
certutil -s "CN=Curve-sect131r2, E=Curve-sect131r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4377: Generate EC Cert Request for Curve-sect131r2 - PASSED
cert.sh: Sign Curve-sect131r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2056 -v 60 -d ../CA -i req -o Curve-sect131r2-ec.cert -f ../tests.pw 
cert.sh: #4378: Sign Curve-sect131r2's EC Request - PASSED
cert.sh: Import Curve-sect131r2's EC Cert --------------------------
certutil -A -n Curve-sect131r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect131r2-ec.cert
cert.sh: #4379: Import Curve-sect131r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163k1 --------------------------
certutil -s "CN=Curve-sect163k1, E=Curve-sect163k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4380: Generate EC Cert Request for Curve-sect163k1 - PASSED
cert.sh: Sign Curve-sect163k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2057 -v 60 -d ../CA -i req -o Curve-sect163k1-ec.cert -f ../tests.pw 
cert.sh: #4381: Sign Curve-sect163k1's EC Request - PASSED
cert.sh: Import Curve-sect163k1's EC Cert --------------------------
certutil -A -n Curve-sect163k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect163k1-ec.cert
cert.sh: #4382: Import Curve-sect163k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163r1 --------------------------
certutil -s "CN=Curve-sect163r1, E=Curve-sect163r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4383: Generate EC Cert Request for Curve-sect163r1 - PASSED
cert.sh: Sign Curve-sect163r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2058 -v 60 -d ../CA -i req -o Curve-sect163r1-ec.cert -f ../tests.pw 
cert.sh: #4384: Sign Curve-sect163r1's EC Request - PASSED
cert.sh: Import Curve-sect163r1's EC Cert --------------------------
certutil -A -n Curve-sect163r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect163r1-ec.cert
cert.sh: #4385: Import Curve-sect163r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163r2 --------------------------
certutil -s "CN=Curve-sect163r2, E=Curve-sect163r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4386: Generate EC Cert Request for Curve-sect163r2 - PASSED
cert.sh: Sign Curve-sect163r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2059 -v 60 -d ../CA -i req -o Curve-sect163r2-ec.cert -f ../tests.pw 
cert.sh: #4387: Sign Curve-sect163r2's EC Request - PASSED
cert.sh: Import Curve-sect163r2's EC Cert --------------------------
certutil -A -n Curve-sect163r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect163r2-ec.cert
cert.sh: #4388: Import Curve-sect163r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect193r1 --------------------------
certutil -s "CN=Curve-sect193r1, E=Curve-sect193r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4389: Generate EC Cert Request for Curve-sect193r1 - PASSED
cert.sh: Sign Curve-sect193r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2060 -v 60 -d ../CA -i req -o Curve-sect193r1-ec.cert -f ../tests.pw 
cert.sh: #4390: Sign Curve-sect193r1's EC Request - PASSED
cert.sh: Import Curve-sect193r1's EC Cert --------------------------
certutil -A -n Curve-sect193r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect193r1-ec.cert
cert.sh: #4391: Import Curve-sect193r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect193r2 --------------------------
certutil -s "CN=Curve-sect193r2, E=Curve-sect193r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4392: Generate EC Cert Request for Curve-sect193r2 - PASSED
cert.sh: Sign Curve-sect193r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2061 -v 60 -d ../CA -i req -o Curve-sect193r2-ec.cert -f ../tests.pw 
cert.sh: #4393: Sign Curve-sect193r2's EC Request - PASSED
cert.sh: Import Curve-sect193r2's EC Cert --------------------------
certutil -A -n Curve-sect193r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect193r2-ec.cert
cert.sh: #4394: Import Curve-sect193r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect233k1 --------------------------
certutil -s "CN=Curve-sect233k1, E=Curve-sect233k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4395: Generate EC Cert Request for Curve-sect233k1 - PASSED
cert.sh: Sign Curve-sect233k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2062 -v 60 -d ../CA -i req -o Curve-sect233k1-ec.cert -f ../tests.pw 
cert.sh: #4396: Sign Curve-sect233k1's EC Request - PASSED
cert.sh: Import Curve-sect233k1's EC Cert --------------------------
certutil -A -n Curve-sect233k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect233k1-ec.cert
cert.sh: #4397: Import Curve-sect233k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect233r1 --------------------------
certutil -s "CN=Curve-sect233r1, E=Curve-sect233r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4398: Generate EC Cert Request for Curve-sect233r1 - PASSED
cert.sh: Sign Curve-sect233r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2063 -v 60 -d ../CA -i req -o Curve-sect233r1-ec.cert -f ../tests.pw 
cert.sh: #4399: Sign Curve-sect233r1's EC Request - PASSED
cert.sh: Import Curve-sect233r1's EC Cert --------------------------
certutil -A -n Curve-sect233r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect233r1-ec.cert
cert.sh: #4400: Import Curve-sect233r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect239k1 --------------------------
certutil -s "CN=Curve-sect239k1, E=Curve-sect239k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect239k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4401: Generate EC Cert Request for Curve-sect239k1 - PASSED
cert.sh: Sign Curve-sect239k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2064 -v 60 -d ../CA -i req -o Curve-sect239k1-ec.cert -f ../tests.pw 
cert.sh: #4402: Sign Curve-sect239k1's EC Request - PASSED
cert.sh: Import Curve-sect239k1's EC Cert --------------------------
certutil -A -n Curve-sect239k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect239k1-ec.cert
cert.sh: #4403: Import Curve-sect239k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect283k1 --------------------------
certutil -s "CN=Curve-sect283k1, E=Curve-sect283k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4404: Generate EC Cert Request for Curve-sect283k1 - PASSED
cert.sh: Sign Curve-sect283k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2065 -v 60 -d ../CA -i req -o Curve-sect283k1-ec.cert -f ../tests.pw 
cert.sh: #4405: Sign Curve-sect283k1's EC Request - PASSED
cert.sh: Import Curve-sect283k1's EC Cert --------------------------
certutil -A -n Curve-sect283k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect283k1-ec.cert
cert.sh: #4406: Import Curve-sect283k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect283r1 --------------------------
certutil -s "CN=Curve-sect283r1, E=Curve-sect283r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4407: Generate EC Cert Request for Curve-sect283r1 - PASSED
cert.sh: Sign Curve-sect283r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2066 -v 60 -d ../CA -i req -o Curve-sect283r1-ec.cert -f ../tests.pw 
cert.sh: #4408: Sign Curve-sect283r1's EC Request - PASSED
cert.sh: Import Curve-sect283r1's EC Cert --------------------------
certutil -A -n Curve-sect283r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect283r1-ec.cert
cert.sh: #4409: Import Curve-sect283r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect409k1 --------------------------
certutil -s "CN=Curve-sect409k1, E=Curve-sect409k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4410: Generate EC Cert Request for Curve-sect409k1 - PASSED
cert.sh: Sign Curve-sect409k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2067 -v 60 -d ../CA -i req -o Curve-sect409k1-ec.cert -f ../tests.pw 
cert.sh: #4411: Sign Curve-sect409k1's EC Request - PASSED
cert.sh: Import Curve-sect409k1's EC Cert --------------------------
certutil -A -n Curve-sect409k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect409k1-ec.cert
cert.sh: #4412: Import Curve-sect409k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect409r1 --------------------------
certutil -s "CN=Curve-sect409r1, E=Curve-sect409r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4413: Generate EC Cert Request for Curve-sect409r1 - PASSED
cert.sh: Sign Curve-sect409r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2068 -v 60 -d ../CA -i req -o Curve-sect409r1-ec.cert -f ../tests.pw 
cert.sh: #4414: Sign Curve-sect409r1's EC Request - PASSED
cert.sh: Import Curve-sect409r1's EC Cert --------------------------
certutil -A -n Curve-sect409r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect409r1-ec.cert
cert.sh: #4415: Import Curve-sect409r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect571k1 --------------------------
certutil -s "CN=Curve-sect571k1, E=Curve-sect571k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4416: Generate EC Cert Request for Curve-sect571k1 - PASSED
cert.sh: Sign Curve-sect571k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2069 -v 60 -d ../CA -i req -o Curve-sect571k1-ec.cert -f ../tests.pw 
cert.sh: #4417: Sign Curve-sect571k1's EC Request - PASSED
cert.sh: Import Curve-sect571k1's EC Cert --------------------------
certutil -A -n Curve-sect571k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect571k1-ec.cert
cert.sh: #4418: Import Curve-sect571k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect571r1 --------------------------
certutil -s "CN=Curve-sect571r1, E=Curve-sect571r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4419: Generate EC Cert Request for Curve-sect571r1 - PASSED
cert.sh: Sign Curve-sect571r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2070 -v 60 -d ../CA -i req -o Curve-sect571r1-ec.cert -f ../tests.pw 
cert.sh: #4420: Sign Curve-sect571r1's EC Request - PASSED
cert.sh: Import Curve-sect571r1's EC Cert --------------------------
certutil -A -n Curve-sect571r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/eccurves -f ../tests.pw -i Curve-sect571r1-ec.cert
cert.sh: #4421: Import Curve-sect571r1's EC Cert - PASSED
cert.sh: Initializing TestExt's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -f ../tests.pw
cert.sh: #4422: Initializing TestExt's Cert DB - PASSED
cert.sh: Loading root cert module to TestExt's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4423: Loading root cert module to TestExt's Cert DB - PASSED
cert.sh: Import Root CA for TestExt --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -i ../CA/TestCA.ca.cert
cert.sh: #4424: Import Root CA for TestExt - PASSED
cert.sh: Import EC Root CA for TestExt --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -i ../CA/TestCA-ec.ca.cert
cert.sh: #4425: Import EC Root CA for TestExt - PASSED
cert.sh: Generate Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4426: Generate Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's Request --------------------------
certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw 
cert.sh: #4427: Sign TestExt's Request - PASSED
cert.sh: Import TestExt's Cert --------------------------
certutil -A -n TestExt -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -f ../tests.pw -i TestExt.cert
cert.sh: #4428: Import TestExt's Cert - PASSED
cert.sh SUCCESS: TestExt's Cert Created
cert.sh: Generate EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4429: Generate EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request --------------------------
certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw 
cert.sh: #4430: Sign TestExt's EC Request - PASSED
cert.sh: Import TestExt's EC Cert --------------------------
certutil -A -n TestExt-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ec.cert
cert.sh: #4431: Import TestExt's EC Cert - PASSED
cert.sh SUCCESS: TestExt's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4432: Generate mixed EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw 
cert.sh: #4433: Sign TestExt's EC Request with RSA - PASSED
cert.sh: Import TestExt's mixed EC Cert --------------------------
certutil -A -n TestExt-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert
cert.sh: #4434: Import TestExt's mixed EC Cert - PASSED
cert.sh SUCCESS: TestExt's mixed EC Cert Created

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt1 -t u,u,u -o /tmp/cert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
n


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt1
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:5f:2e
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 00:09:04 2012
            Not After : Thu Feb 28 00:09:04 2013
        Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d1:d5:83:6a:7d:da:c6:29:9e:03:04:2d:e9:b8:1d:18:
                    ad:0f:6f:2d:0a:c7:e0:1f:bc:85:cf:28:b5:5e:c7:5b:
                    06:93:e2:0c:cf:fc:63:4c:95:e9:16:79:d2:45:3a:5e:
                    c6:4e:3d:98:ef:b5:c3:4b:c0:e3:26:3a:79:8a:56:30:
                    34:76:72:95:cb:8b:bc:81:2b:a2:db:bd:b4:83:12:83:
                    30:1f:75:ad:6e:5b:4b:e1:a5:e1:0b:67:4b:0f:7d:14:
                    f6:e9:3c:d4:9d:c5:47:d6:18:4a:fc:07:b7:cf:55:79:
                    2f:7a:b8:c8:7a:e6:4f:2e:c5:ff:17:5f:10:dd:aa:21
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Usages: Digital Signature
                    Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        69:8c:aa:90:b4:9e:d1:f4:81:b8:68:eb:91:09:f8:a8:
        b2:b7:14:01:e2:d1:c0:aa:97:95:2b:79:b7:02:70:62:
        83:03:27:59:a3:46:9d:7b:a2:24:d7:77:54:8b:f9:c0:
        07:f2:85:cf:93:34:af:64:80:f0:bd:6c:dd:f4:9f:e8:
        d6:c4:cf:2a:0c:03:52:e2:22:71:d5:03:0e:5b:b4:2c:
        20:4d:e9:e2:ab:f1:3a:e6:05:29:b7:e1:94:e6:dd:91:
        93:fc:79:3b:8f:dc:d5:9c:2c:71:49:86:06:28:90:83:
        92:a7:ad:18:e0:f2:83:fe:a1:53:45:a9:f5:f5:20:f0
    Fingerprint (MD5):
        1D:60:5C:20:74:56:B5:52:66:AC:22:1E:7E:C3:DC:AA
    Fingerprint (SHA1):
        48:2D:77:8D:94:8C:AD:B9:75:E8:CC:94:B3:45:0B:7B:90:8A:72:18

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4435: Certificate Key Usage Extension (1) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt2 -t u,u,u -o /tmp/cert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt2
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:5f:2e
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 00:09:04 2012
            Not After : Thu Feb 28 00:09:04 2013
        Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cb:12:91:6f:16:e9:04:e0:3e:34:78:42:6f:c9:c5:c2:
                    e4:30:b8:df:0d:cd:be:fb:aa:1b:f1:8b:73:60:d4:67:
                    71:c1:0f:50:77:a1:8f:b5:ad:80:6b:dd:9f:45:75:ca:
                    b8:4c:39:4e:0f:0e:59:0d:71:fe:20:76:ff:d6:5f:fb:
                    3e:c2:a7:40:08:ed:ee:da:6d:f7:19:0f:26:9f:c2:60:
                    0e:35:c3:70:05:f2:6f:03:ae:fa:c1:21:c5:1b:0c:31:
                    19:bd:d7:a9:ae:44:88:85:55:20:ee:2f:02:7e:0d:67:
                    7c:91:c0:f7:ef:e0:46:ad:bf:34:40:6b:73:56:d4:57
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Critical: True
            Usages: Digital Signature
                    Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b4:c2:62:15:ad:6e:21:30:a5:39:64:84:f1:ed:6c:3f:
        94:cc:28:c4:e9:a5:cc:c8:f6:54:d5:6d:93:ba:07:0b:
        73:d3:1b:eb:64:de:99:a6:fc:cb:99:68:01:d1:18:d2:
        1b:2d:32:a5:2d:7f:3d:93:02:6c:8d:61:7d:99:bb:1a:
        de:f2:c3:6b:14:40:e4:e6:ca:df:09:d1:b1:f2:68:0c:
        ed:b3:f9:74:cc:ee:c2:d9:39:f5:8b:87:1e:fc:a6:89:
        1e:b7:23:7a:97:a6:3f:69:8f:cd:87:d7:43:ff:ec:d9:
        b0:4f:86:7d:5f:d7:37:07:94:b8:4b:f3:1b:c4:65:6e
    Fingerprint (MD5):
        0E:88:12:87:72:FD:A9:26:DD:D4:25:01:E1:E5:A3:38
    Fingerprint (SHA1):
        A6:F7:DB:E4:9D:A1:ED:1B:32:9F:C4:E7:F6:E3:F2:5F:1E:FC:35:49

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4436: Certificate Key Usage Extension (2) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt3 -t u,u,u -o /tmp/cert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
y
-1
n


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt3
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:5f:2f
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 00:09:05 2012
            Not After : Thu Feb 28 00:09:05 2013
        Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a6:b4:eb:52:92:eb:dd:91:9f:f0:4b:1b:09:82:b3:8b:
                    21:14:ee:e8:09:40:6f:bd:e1:f7:95:e9:18:59:69:82:
                    28:6c:33:c3:ad:af:de:40:98:64:a6:d8:0b:54:bc:68:
                    29:d5:82:9f:ed:f7:74:86:6b:9c:d5:88:f8:58:4b:2a:
                    e3:8a:21:e3:41:05:92:27:f8:b0:bb:f7:dc:c7:e7:55:
                    9b:d2:3f:4a:27:d5:00:18:5f:56:17:70:9f:81:b4:10:
                    68:89:c8:da:39:dc:31:a7:7a:ac:70:8e:09:20:ca:fa:
                    9d:81:c9:3e:b9:26:d7:c5:16:72:25:bf:57:9b:e7:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0f:01:41:14:44:c8:62:e4:a2:64:8a:47:a9:36:6c:01:
        67:e7:96:eb:1b:4b:3b:07:ea:30:d9:f1:30:33:19:93:
        e2:4a:c9:3d:10:51:42:a4:35:36:8a:ef:8e:4e:8f:4f:
        c7:b2:76:b0:06:3a:86:f7:cd:d7:52:c5:9b:91:71:14:
        76:51:2a:5a:c2:9b:48:a2:42:01:5b:01:76:d4:03:96:
        d0:dd:d7:1d:39:fe:63:73:ad:bd:ef:8e:0c:5d:01:35:
        c7:f6:64:b7:ef:d8:50:7f:5c:59:00:62:23:50:a2:80:
        ca:92:c5:7e:4e:09:0c:71:c7:08:15:ba:7e:ae:93:a1
    Fingerprint (MD5):
        BE:C6:54:0D:38:4D:D0:77:63:8B:14:B6:FD:6E:37:1A
    Fingerprint (SHA1):
        AE:94:00:D4:2C:61:06:65:11:64:3D:AB:1E:4D:D6:C3:53:4F:1F:9F

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4437: Certificate Basic Constraints Extension (3) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt4 -t u,u,u -o /tmp/cert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
n
-1
y


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt4
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:5f:2f
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 00:09:05 2012
            Not After : Thu Feb 28 00:09:05 2013
        Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:13:53:75:8e:64:4d:35:ef:f5:c2:08:9a:bb:6b:f0:
                    06:ab:05:7d:19:39:fe:8e:20:45:af:a7:d1:50:81:46:
                    86:7f:3f:8e:78:f2:d6:0d:95:f5:54:e0:2d:79:48:c0:
                    cb:71:97:cf:9b:9f:2d:26:e7:11:c0:91:7c:35:11:2a:
                    13:77:e4:36:61:ef:2d:ff:f6:97:16:b9:84:ee:71:07:
                    89:66:cb:50:cf:c7:af:f3:14:81:77:47:68:c8:31:28:
                    03:f8:f4:8a:2a:35:1d:f3:9b:b4:fe:18:d8:b9:1a:51:
                    b3:8f:b9:dd:64:08:5e:8e:6d:43:d4:73:37:ff:3b:91
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is not a CA.

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        40:7a:c0:b0:77:03:96:3e:90:72:34:2e:b9:b6:97:69:
        65:e5:ef:ca:6e:96:b8:72:ef:0c:d8:a6:d2:b4:67:f1:
        6f:84:52:3d:e6:1d:1c:9e:26:cc:de:53:ae:fc:ed:78:
        9e:f0:cb:70:48:34:c1:30:a6:a3:6f:f7:2b:08:ce:73:
        4f:11:f5:cf:ff:2d:0d:0b:6e:1c:65:b6:55:7a:51:b8:
        85:d2:36:4c:5c:37:d7:31:db:da:b5:64:20:69:74:8c:
        5e:67:04:5c:5a:9b:61:1e:77:73:a3:27:ca:61:57:2e:
        55:3e:5f:fc:70:60:48:69:5e:08:8b:05:d0:98:40:63
    Fingerprint (MD5):
        BD:A9:73:BB:73:E5:8B:DD:74:91:26:F4:8D:11:5D:C4
    Fingerprint (SHA1):
        71:D2:92:0E:ED:E6:F9:EE:5D:93:B9:3F:16:BD:0E:0B:69:A5:CD:76

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4438: Certificate Basic Constraints Extension (4) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt5 -t u,u,u -o /tmp/cert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
y
12341235123


y


Generating key.  This may take a few moments...

Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt5
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:5f:30
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 00:09:05 2012
            Not After : Thu Feb 28 00:09:05 2013
        Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    db:3b:6d:05:26:12:4b:29:b5:47:34:ab:3c:ec:7c:19:
                    33:85:27:5f:ea:e2:e8:8e:23:0c:1e:c1:7c:c3:58:5a:
                    bf:72:62:17:b1:b5:d3:8d:ca:2e:72:96:e1:15:e8:71:
                    88:c9:1d:8a:d6:91:db:e1:54:dd:f0:ba:59:12:1a:5c:
                    f2:c6:0f:2b:40:0d:23:8c:61:e5:4b:48:e2:2b:63:4d:
                    21:7b:f5:d1:bb:95:f6:60:21:9e:fb:ef:9f:b7:56:a7:
                    ee:84:3b:f6:9e:7d:5b:d7:50:71:09:78:87:b1:71:38:
                    e9:5b:34:da:5d:b1:e5:ec:59:f6:8c:2b:a4:e9:83:45
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Critical: True
            Key ID:
                12341235123

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8b:e4:87:0f:ad:6e:6c:f1:7f:0d:88:f1:7f:5f:52:eb:
        08:88:ed:0e:68:f5:1b:e6:61:f8:2a:5b:8d:e7:28:95:
        6a:17:40:39:3f:a7:45:a5:80:0b:cb:ca:e4:e5:4b:8e:
        27:4c:25:e5:c7:eb:a3:2e:48:21:be:1b:c5:d5:21:8e:
        7c:aa:83:06:48:df:cb:c6:70:45:e2:55:2b:8e:7c:b0:
        9c:4b:82:9d:9b:0c:6d:32:f6:2a:f0:52:a3:4f:39:e9:
        5f:98:e4:e7:38:e9:94:9e:c7:09:91:53:6a:d0:29:a8:
        a8:63:d6:d5:c5:00:c2:cb:87:42:72:9a:84:17:55:5c
    Fingerprint (MD5):
        C4:81:B8:74:10:3D:07:BE:D2:18:65:69:2D:8C:D0:88
    Fingerprint (SHA1):
        22:CB:37:C0:3A:B9:23:7D:86:EA:E9:D3:01:1C:89:C9:E9:6C:27:CA

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4439: Certificate Authority Key Identifier Extension (5) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt6 -t u,u,u -o /tmp/cert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
y

3
test.com

214123
y


Generating key.  This may take a few moments...

Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt6
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:5f:31
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 00:09:06 2012
            Not After : Thu Feb 28 00:09:06 2013
        Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c8:d2:a8:34:72:95:3e:62:d0:92:40:ee:de:08:c8:7e:
                    4f:05:21:bf:18:a5:6c:26:6b:4e:1d:0f:12:dc:98:fa:
                    ab:2c:8d:52:2d:40:db:a4:47:57:3e:25:cd:7e:73:6a:
                    e8:22:6e:8a:a2:b6:7f:66:60:fd:b7:56:e1:05:cf:2e:
                    cb:71:67:bf:0b:fb:6c:d0:bf:e3:a8:35:76:c4:14:93:
                    e6:55:5c:70:3d:6a:0e:5f:0b:a5:c1:0e:a2:dc:f8:2c:
                    54:b4:02:fa:51:5c:fd:fe:32:c3:36:a9:cc:0b:88:8c:
                    34:b7:ae:9e:dc:70:75:88:0d:30:69:fd:0b:b3:bb:db
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Critical: True
            Issuer: 
                DNS name: "test.com"
            Serial Number:
                214123

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3d:07:c5:84:73:7f:7b:16:19:91:19:6e:b8:02:4b:53:
        eb:d5:5f:09:0b:e4:0a:07:db:a4:38:c1:ab:05:2f:af:
        b3:e5:82:bb:98:f3:d9:3d:22:92:49:3e:1e:bb:53:7b:
        29:fe:2c:5e:5d:41:17:6c:2c:1b:30:db:a2:ef:1e:36:
        bd:60:93:68:85:6b:80:84:86:16:1e:91:4b:84:9a:a7:
        06:3f:32:79:60:d1:0b:ed:29:ff:75:35:a4:e2:d2:90:
        01:0e:94:ae:7d:de:86:4b:70:dd:b5:49:6d:2c:3f:29:
        bb:40:e3:a3:a2:40:e1:dd:48:0e:ff:5d:8a:19:58:ea
    Fingerprint (MD5):
        7D:F4:46:76:86:AB:7E:D2:A7:E7:85:CF:F4:D2:0C:47
    Fingerprint (SHA1):
        7A:49:7F:56:46:6A:3C:75:07:D4:F0:C1:6E:C1:35:87:4B:6F:02:B1

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4440: Certificate Authority Key Identifier Extension (6) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt7 -t u,u,u -o /tmp/cert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
1
2
rfc822@name.tld
3
test.com
8
1.2.3.4
9
OID.0.2.213
10
0
10
n
n


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt7
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:5f:31
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 00:09:06 2012
            Not After : Thu Feb 28 00:09:06 2013
        Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:d8:bb:81:a7:3c:87:53:cc:8f:15:3b:e4:5d:f3:02:
                    44:8f:69:2c:3d:6d:b0:e0:64:52:8b:10:29:32:06:98:
                    b2:6b:c6:76:c8:b3:99:3f:27:a9:ea:a1:da:eb:99:80:
                    73:1a:3a:57:eb:23:e3:87:04:bd:13:50:22:68:ed:8f:
                    c5:53:47:d1:05:5b:25:81:22:6a:66:d3:dc:4e:dc:d7:
                    9d:cd:49:07:ce:1c:bd:f5:74:64:8c:e2:aa:28:a2:1e:
                    0f:3d:ce:27:8a:fa:cc:d7:fd:3c:a3:a9:c5:7d:0b:62:
                    5d:2e:bb:d8:d7:6d:34:a1:c4:31:7f:fc:db:74:66:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: CRL Distribution Points
            Distribution point:
                RFC822 Name: "rfc822@name.tld"
                DNS name: "test.com"
                IP Address:
                    87:07:31:2e:32:2e:33:2e:34
                Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51
                Reasons:
                    80
                    (7 least significant bits unused)

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        96:ba:65:59:68:e3:98:bf:ed:a0:e4:dc:cf:e4:f9:ae:
        98:d2:12:60:85:d3:ec:70:a5:ed:bd:ee:1a:a9:a3:b4:
        90:88:40:3f:69:14:2a:7f:25:b0:4d:bf:a8:29:b2:e7:
        dc:4f:09:c4:96:e5:b2:4c:0f:bb:b9:3e:5b:1c:00:5e:
        6f:93:ea:81:00:66:e4:44:93:f5:e8:9d:c3:87:44:9d:
        91:df:42:fe:a3:77:e9:ac:94:93:af:0c:3a:09:83:23:
        05:aa:fc:d7:47:2a:83:79:3b:83:89:01:fd:7c:a8:74:
        85:f2:88:2d:79:02:f3:a1:b3:c9:ea:90:e2:50:bf:14
    Fingerprint (MD5):
        76:2F:F5:9A:24:EE:94:75:80:1F:CD:CF:3F:52:71:1C
    Fingerprint (SHA1):
        F5:F8:43:56:E2:83:26:34:CB:9A:66:FB:BF:3E:39:F0:65:0E:79:87

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4441: CRL Distribution Points Extension (7) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt8 -t u,u,u -o /tmp/cert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
2
SN=asdfsdf
4
3
test.com
10
n
n


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > Enter the relative name: 

Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt8
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:5f:32
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 00:09:06 2012
            Not After : Thu Feb 28 00:09:06 2013
        Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c7:3b:05:05:db:07:79:52:5d:99:4f:2f:bc:81:ee:9d:
                    8c:e9:49:55:70:c5:50:f3:48:bf:61:ab:92:ca:d3:99:
                    3b:38:79:69:21:d2:30:26:43:d4:8d:e0:77:ce:37:fc:
                    65:74:c6:53:d8:e6:1d:82:6d:8e:9c:7e:a8:85:41:39:
                    ba:9c:e5:b9:4d:92:5c:a7:62:b4:6a:b4:a1:a5:fc:54:
                    5e:46:f8:e9:8e:87:9b:cc:0e:40:c7:20:9f:39:3a:d3:
                    2b:64:d8:c4:d3:ec:a8:22:8a:9b:77:17:d8:a4:8f:b7:
                    f8:3c:71:d3:5b:ef:06:24:36:87:19:92:b1:6b:15:1b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: CRL Distribution Points
            Distribution point:
                RDN: "SN=asdfsdf"
                Reasons:
                    08
                    (7 least significant bits unused)
                CRL issuer: 
                    DNS name: "test.com"

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        4c:c6:39:69:4b:e5:e7:62:2d:20:84:bc:9f:47:b3:aa:
        f3:21:27:0b:e7:21:24:43:6e:3c:42:69:dc:14:70:7c:
        9b:3c:3e:04:07:86:9b:63:c4:7f:51:7f:26:45:b8:2f:
        a7:da:91:70:2e:4a:34:6b:d8:0d:c8:fc:b6:cd:12:b2:
        d6:58:88:55:3b:1f:3c:06:24:06:01:9f:ea:59:a4:6a:
        ed:32:e3:23:dd:b8:5d:7f:de:9b:5b:07:72:17:e1:c7:
        b3:61:07:e0:c6:95:12:fc:05:e1:40:db:81:58:c2:7e:
        de:11:be:3e:51:8c:27:0c:3c:5c:4a:2b:03:26:e4:8b
    Fingerprint (MD5):
        27:9B:29:87:17:E2:A7:1E:85:73:6C:5F:88:EF:9B:72
    Fingerprint (SHA1):
        03:FB:F1:EB:BC:A7:0A:04:B1:B0:6B:FD:56:E8:F3:93:1F:10:91:7C

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4442: CRL Distribution Points Extension (8) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt9 -t u,u,u -o /tmp/cert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
0
1
2
10
n


Generating key.  This may take a few moments...

0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt9
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:5f:33
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 00:09:07 2012
            Not After : Thu Feb 28 00:09:07 2013
        Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    aa:66:33:39:59:47:15:07:91:4d:fd:bb:37:5c:64:21:
                    03:bd:fb:b3:3f:ef:82:f3:a0:f7:d4:3e:1e:ff:d8:d4:
                    27:90:69:54:f3:86:9c:7b:8c:89:1a:99:50:9c:86:4a:
                    c3:c5:99:25:e3:a1:f0:26:f3:ef:3a:70:f1:92:8d:ff:
                    2b:82:49:5b:db:4b:a3:e4:65:ce:c3:00:58:42:bd:a8:
                    8e:a7:10:21:23:a0:ac:ba:55:76:1c:3a:56:b8:cb:c0:
                    27:b3:26:64:9b:ea:b6:6a:b7:01:af:1c:f5:3b:cd:fa:
                    5e:89:60:50:b4:87:36:95:78:18:63:36:42:30:b9:d7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL Client,SSL Server,S/MIME>

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        63:39:18:ba:48:45:fb:c0:3a:16:79:6c:3e:b1:16:29:
        72:8b:28:d4:b1:c6:76:f8:c6:0d:7d:54:5f:77:a7:97:
        d5:a1:d7:07:fc:1f:b6:18:04:d7:f9:36:36:8e:4c:1b:
        f1:3f:31:1f:5e:ad:51:1a:5a:7c:36:83:aa:da:8c:7f:
        1b:08:f3:63:4e:a1:37:ad:be:27:33:0c:0e:e3:dc:ac:
        bc:fa:ef:a1:06:e8:e1:5e:87:6c:0e:8b:34:16:00:6f:
        cd:0a:d4:02:53:89:cb:7c:0d:55:86:c5:b3:77:3e:3d:
        b4:59:78:8d:c7:bd:f7:c7:b2:bc:da:63:3d:f3:cf:8d
    Fingerprint (MD5):
        6F:78:A2:25:72:38:C1:41:C5:98:9A:A2:EB:7A:BE:75
    Fingerprint (SHA1):
        49:38:0B:54:11:CA:A6:7D:64:8C:67:C8:9D:A9:64:43:87:19:C6:DD

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4443: Certificate Type Extension (9) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt10 -t u,u,u -o /tmp/cert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y


Generating key.  This may take a few moments...

0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt10
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:5f:33
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi
            ew,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 00:09:07 2012
            Not After : Thu Feb 28 00:09:07 2013
        Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V
            iew,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a5:7f:c9:ab:cb:65:91:16:ef:ee:c6:a3:87:9e:8f:b1:
                    68:14:4f:91:af:1d:0d:30:cd:18:c5:07:b6:ad:af:b4:
                    bc:e8:39:05:04:8d:3b:1d:67:75:a1:cd:bd:2c:20:1d:
                    1a:74:97:27:f6:e4:25:86:b8:8e:00:eb:d2:68:92:d1:
                    61:8d:2c:65:a1:e6:ce:be:dc:b8:aa:eb:c9:cc:9e:de:
                    75:65:26:58:29:32:0e:f8:01:f5:29:24:30:9d:d8:51:
                    00:82:7a:36:59:62:18:7e:53:57:cc:21:c1:ea:73:5d:
                    d6:0b:b5:5f:dc:41:92:a0:cb:4d:dd:c0:d2:e5:0a:e3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Extended Key Usage
            Critical: True
                TLS Web Server Authentication Certificate
                TLS Web Client Authentication Certificate
                Code Signing Certificate
                E-Mail Protection Certificate
                Time Stamping Certifcate
                OCSP Responder Certificate
                Strong Crypto Export Approved

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a3:b9:28:83:20:ce:37:73:27:dd:7a:21:ac:0c:46:44:
        2a:38:4b:6d:93:36:c9:06:13:ef:01:de:64:e6:06:03:
        58:21:ed:ab:61:77:51:8a:ff:e8:e5:a2:61:10:6a:6e:
        de:07:a6:15:91:c8:6e:48:ec:de:fb:10:a7:39:4a:b3:
        b0:68:0b:42:ec:4e:59:80:8d:62:32:04:6b:c8:00:41:
        06:c0:90:be:21:b7:6d:77:81:c3:d0:c6:1e:78:00:6d:
        70:51:90:a1:c3:1b:12:75:54:8e:0f:b9:0b:73:2a:73:
        39:e3:f2:65:65:fd:33:64:92:a8:25:2e:e5:fb:de:ef
    Fingerprint (MD5):
        0D:72:64:2D:74:E5:53:0F:60:4C:07:0B:E5:AF:6F:72
    Fingerprint (SHA1):
        A8:D8:7F:31:BD:5C:F0:3B:F0:61:00:D4:37:44:6C:62:F3:C5:9E:B9

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4444: Extended Key Usage Extension (10) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -S -n TestExt11 -t u,u,u -o /tmp/cert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions/test.args
certutil options:

1
2
3
4
5
6
10
n


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cert_extensions -L -n TestExt11
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:5f:34
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi
            ew,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 00:09:08 2012
            Not After : Thu Feb 28 00:09:08 2013
        Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V
            iew,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c6:16:9e:de:12:36:f8:a8:e3:f3:6a:48:ec:0b:f4:b9:
                    2b:dd:31:fc:e2:ad:c6:22:f0:a8:5f:0c:3a:82:54:4b:
                    b0:7a:6f:81:93:b6:76:6b:b0:f6:e6:0b:8e:17:13:a0:
                    6f:b7:88:7f:72:c9:f9:0b:f6:d3:17:1f:f6:1e:1c:10:
                    ed:58:2a:2f:b0:d4:65:fa:fc:4c:11:a9:7e:5a:74:7e:
                    29:68:6a:ef:cd:74:77:64:a6:92:3e:dd:62:77:e3:8f:
                    d9:cc:ff:0c:dc:5e:7e:6e:84:bd:8f:60:6d:8f:41:34:
                    e4:8f:e2:51:60:fe:ce:8f:ab:93:d2:60:1b:3c:02:51
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Usages: Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        73:f6:68:89:71:5a:ba:d7:2c:84:95:94:c5:b4:74:4c:
        6d:8b:87:8a:69:2d:b6:8c:14:bf:26:14:42:91:94:2e:
        96:a9:5d:f8:78:ce:4c:0f:8f:e4:ac:13:44:af:fb:00:
        87:69:e7:e2:6d:2e:13:48:f2:58:f6:58:c0:a9:a7:24:
        44:63:05:bd:67:33:86:31:b6:50:a8:7c:51:cd:0e:69:
        88:f7:7d:30:a7:37:90:cc:dc:7f:55:73:32:b5:97:a3:
        68:07:13:65:9d:f7:89:fa:6c:1d:51:eb:a4:52:8c:65:
        bd:42:1f:9d:cb:a2:84:2f:5d:32:7b:df:fe:95:be:6a
    Fingerprint (MD5):
        69:93:61:B9:D1:88:84:39:F6:0F:24:34:B8:F5:03:CC
    Fingerprint (SHA1):
        3D:43:9C:9A:99:E0:5F:7C:5D:58:47:35:AD:03:47:41:C4:F1:69:B6

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #4445: Certificate Key Usage Extension (11) - PASSED
cert.sh: Create A Password Test Cert  ==============
cert.sh: Create A Password Test Ca  --------
cert.sh: Creating a CA Certificate PasswordCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dbpass
cert.sh: Creating CA Cert DB --------------------------
certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dbpass -f ../tests.pw
cert.sh: #4446: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dbpass

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4447: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert PasswordCA  --------------------------
certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4448: Creating CA Cert PasswordCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n PasswordCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dbpass -o root.cert
cert.sh: #4449: Exporting Root Cert - PASSED
cert.sh: Changing password on Password Test Cert's Cert DB --------------------------
certutil -W -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dbpass -f ../tests.pw -@ ../tests.fipspw
Password changed successfully.
cert.sh: #4450: Changing password on Password Test Cert's Cert DB - PASSED
cert.sh: Generate Certificate for Password Test Cert with new password --------------------------
certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dbpass -f ../tests.fipspw -z ../tests_noise


Generating key.  This may take a few moments...

cert.sh: #4451: Generate Certificate for Password Test Cert with new password - PASSED
cert.sh SUCCESS: PASSWORD passed
cert.sh: Verify Certificate for Password Test Cert with new password --------------------------
certutil -V -n PasswordCert -u S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/dbpass -f ../tests.fipspw
certutil: certificate is valid
cert.sh: #4452: Verify Certificate for Password Test Cert with new password - PASSED
cert.sh: Creating Distrusted Certificate
cert.sh: Initializing Distrusted's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
cert.sh: #4453: Initializing Distrusted's Cert DB - PASSED
cert.sh: Loading root cert module to Distrusted's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #4454: Loading root cert module to Distrusted's Cert DB - PASSED
cert.sh: Import Root CA for Distrusted --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -i ../CA/TestCA.ca.cert
cert.sh: #4455: Import Root CA for Distrusted - PASSED
cert.sh: Import EC Root CA for Distrusted --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -i ../CA/TestCA-ec.ca.cert
cert.sh: #4456: Import EC Root CA for Distrusted - PASSED
cert.sh: Generate Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4457: Generate Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's Request --------------------------
certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw 
cert.sh: #4458: Sign Distrusted's Request - PASSED
cert.sh: Import Distrusted's Cert --------------------------
certutil -A -n Distrusted -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw -i Distrusted.cert
cert.sh: #4459: Import Distrusted's Cert - PASSED
cert.sh SUCCESS: Distrusted's Cert Created
cert.sh: Generate EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4460: Generate EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request --------------------------
certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw 
cert.sh: #4461: Sign Distrusted's EC Request - PASSED
cert.sh: Import Distrusted's EC Cert --------------------------
certutil -A -n Distrusted-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw -i Distrusted-ec.cert
cert.sh: #4462: Import Distrusted's EC Cert - PASSED
cert.sh SUCCESS: Distrusted's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4463: Generate mixed EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request with RSA --------------------------
certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw 
cert.sh: #4464: Sign Distrusted's EC Request with RSA - PASSED
cert.sh: Import Distrusted's mixed EC Cert --------------------------
certutil -A -n Distrusted-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw -i Distrusted-ecmixed.cert
cert.sh: #4465: Import Distrusted's mixed EC Cert - PASSED
cert.sh SUCCESS: Distrusted's mixed EC Cert Created
cert.sh: Mark CERT as unstrusted --------------------------
certutil -M -n Distrusted -t p,p,p -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
cert.sh: #4466: Mark CERT as unstrusted - PASSED
cert.sh: Creating Distrusted Intermediate
cert.sh: Creating a CA Certificate DistrustedCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA
cert.sh: Creating CA Cert DistrustedCA  --------------------------
certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #4467: Creating CA Cert DistrustedCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n DistrustedCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -o root.cert
cert.sh: #4468: Exporting Root Cert - PASSED
cert.sh: Import Distrusted Intermediate --------------------------
certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -i ../CA/DistrustedCA.ca.cert
cert.sh: #4469: Import Distrusted Intermediate - PASSED
cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA --------------------------
certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4470: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED
cp: `./req' and `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA/req' are the same file
cert.sh: Sign LeafChainedToDistrustedCA's Request --------------------------
certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw
cert.sh: #4471: Sign LeafChainedToDistrustedCA's Request - PASSED
cert.sh: Import LeafChainedToDistrustedCA's Cert  -t u,u,u --------------------------
certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert
cert.sh: #4472: Import LeafChainedToDistrustedCA's Cert  -t u,u,u - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server --------------------------
certutil -V -n LeafChainedToDistrustedCA -u V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4473: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client --------------------------
certutil -V -n LeafChainedToDistrustedCA -u C -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4474: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4475: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient --------------------------
certutil -V -n LeafChainedToDistrustedCA -u R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4476: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder --------------------------
certutil -V -n LeafChainedToDistrustedCA -u O -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #4477: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u J -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #4478: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED
cert.sh: Verify Distrusted Cert for SSL Server --------------------------
certutil -V -n Distrusted -u V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4479: Verify Distrusted Cert for SSL Server - PASSED
cert.sh: Verify Distrusted Cert for SSL Client --------------------------
certutil -V -n Distrusted -u C -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4480: Verify Distrusted Cert for SSL Client - PASSED
cert.sh: Verify Distrusted Cert for Email signer --------------------------
certutil -V -n Distrusted -u S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4481: Verify Distrusted Cert for Email signer - PASSED
cert.sh: Verify Distrusted Cert for Email recipient --------------------------
certutil -V -n Distrusted -u R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4482: Verify Distrusted Cert for Email recipient - PASSED
cert.sh: Verify Distrusted Cert for OCSP responder --------------------------
certutil -V -n Distrusted -u O -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #4483: Verify Distrusted Cert for OCSP responder - PASSED
cert.sh: Verify Distrusted Cert for Object Signer --------------------------
certutil -V -n Distrusted -u J -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #4484: Verify Distrusted Cert for Object Signer - PASSED
cert.sh: OCSP response creation selftest
cert.sh: perform selftest --------------------------
ocspresp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/serverCA serverCA chain-1-serverCA -f ../tests.pw
cert.sh: #4485: perform selftest - PASSED
cert.sh: Creating Client CA Issued Certificates Range 40 - 52 ===
cert.sh: Generate Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4486: Generate Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw 
cert.sh: #4487: Sign TestUser40's Request - PASSED
cert.sh: Import TestUser40's Cert --------------------------
certutil -A -n TestUser40 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser40.cert
cert.sh: #4488: Import TestUser40's Cert - PASSED
cert.sh SUCCESS: TestUser40's Cert Created
cert.sh: Generate EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4489: Generate EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw 
cert.sh: #4490: Sign TestUser40's EC Request - PASSED
cert.sh: Import TestUser40's EC Cert --------------------------
certutil -A -n TestUser40-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser40-ec.cert
cert.sh: #4491: Import TestUser40's EC Cert - PASSED
cert.sh SUCCESS: TestUser40's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4492: Generate mixed EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw 
cert.sh: #4493: Sign TestUser40's EC Request with RSA - PASSED
cert.sh: Import TestUser40's mixed EC Cert --------------------------
certutil -A -n TestUser40-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser40-ecmixed.cert
cert.sh: #4494: Import TestUser40's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser40's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4495: Generate Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's Request --------------------------
certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw 
cert.sh: #4496: Sign TestUser41's Request - PASSED
cert.sh: Import TestUser41's Cert --------------------------
certutil -A -n TestUser41 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser41.cert
cert.sh: #4497: Import TestUser41's Cert - PASSED
cert.sh SUCCESS: TestUser41's Cert Created
cert.sh: Generate EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4498: Generate EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request --------------------------
certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw 
cert.sh: #4499: Sign TestUser41's EC Request - PASSED
cert.sh: Import TestUser41's EC Cert --------------------------
certutil -A -n TestUser41-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser41-ec.cert
cert.sh: #4500: Import TestUser41's EC Cert - PASSED
cert.sh SUCCESS: TestUser41's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4501: Generate mixed EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw 
cert.sh: #4502: Sign TestUser41's EC Request with RSA - PASSED
cert.sh: Import TestUser41's mixed EC Cert --------------------------
certutil -A -n TestUser41-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser41-ecmixed.cert
cert.sh: #4503: Import TestUser41's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser41's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4504: Generate Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's Request --------------------------
certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw 
cert.sh: #4505: Sign TestUser42's Request - PASSED
cert.sh: Import TestUser42's Cert --------------------------
certutil -A -n TestUser42 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser42.cert
cert.sh: #4506: Import TestUser42's Cert - PASSED
cert.sh SUCCESS: TestUser42's Cert Created
cert.sh: Generate EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4507: Generate EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request --------------------------
certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw 
cert.sh: #4508: Sign TestUser42's EC Request - PASSED
cert.sh: Import TestUser42's EC Cert --------------------------
certutil -A -n TestUser42-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser42-ec.cert
cert.sh: #4509: Import TestUser42's EC Cert - PASSED
cert.sh SUCCESS: TestUser42's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4510: Generate mixed EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw 
cert.sh: #4511: Sign TestUser42's EC Request with RSA - PASSED
cert.sh: Import TestUser42's mixed EC Cert --------------------------
certutil -A -n TestUser42-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser42-ecmixed.cert
cert.sh: #4512: Import TestUser42's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser42's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4513: Generate Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's Request --------------------------
certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw 
cert.sh: #4514: Sign TestUser43's Request - PASSED
cert.sh: Import TestUser43's Cert --------------------------
certutil -A -n TestUser43 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser43.cert
cert.sh: #4515: Import TestUser43's Cert - PASSED
cert.sh SUCCESS: TestUser43's Cert Created
cert.sh: Generate EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4516: Generate EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request --------------------------
certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw 
cert.sh: #4517: Sign TestUser43's EC Request - PASSED
cert.sh: Import TestUser43's EC Cert --------------------------
certutil -A -n TestUser43-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser43-ec.cert
cert.sh: #4518: Import TestUser43's EC Cert - PASSED
cert.sh SUCCESS: TestUser43's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4519: Generate mixed EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw 
cert.sh: #4520: Sign TestUser43's EC Request with RSA - PASSED
cert.sh: Import TestUser43's mixed EC Cert --------------------------
certutil -A -n TestUser43-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser43-ecmixed.cert
cert.sh: #4521: Import TestUser43's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser43's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4522: Generate Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's Request --------------------------
certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw 
cert.sh: #4523: Sign TestUser44's Request - PASSED
cert.sh: Import TestUser44's Cert --------------------------
certutil -A -n TestUser44 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser44.cert
cert.sh: #4524: Import TestUser44's Cert - PASSED
cert.sh SUCCESS: TestUser44's Cert Created
cert.sh: Generate EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4525: Generate EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request --------------------------
certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw 
cert.sh: #4526: Sign TestUser44's EC Request - PASSED
cert.sh: Import TestUser44's EC Cert --------------------------
certutil -A -n TestUser44-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser44-ec.cert
cert.sh: #4527: Import TestUser44's EC Cert - PASSED
cert.sh SUCCESS: TestUser44's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4528: Generate mixed EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw 
cert.sh: #4529: Sign TestUser44's EC Request with RSA - PASSED
cert.sh: Import TestUser44's mixed EC Cert --------------------------
certutil -A -n TestUser44-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser44-ecmixed.cert
cert.sh: #4530: Import TestUser44's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser44's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4531: Generate Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's Request --------------------------
certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw 
cert.sh: #4532: Sign TestUser45's Request - PASSED
cert.sh: Import TestUser45's Cert --------------------------
certutil -A -n TestUser45 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser45.cert
cert.sh: #4533: Import TestUser45's Cert - PASSED
cert.sh SUCCESS: TestUser45's Cert Created
cert.sh: Generate EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4534: Generate EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request --------------------------
certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw 
cert.sh: #4535: Sign TestUser45's EC Request - PASSED
cert.sh: Import TestUser45's EC Cert --------------------------
certutil -A -n TestUser45-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser45-ec.cert
cert.sh: #4536: Import TestUser45's EC Cert - PASSED
cert.sh SUCCESS: TestUser45's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4537: Generate mixed EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw 
cert.sh: #4538: Sign TestUser45's EC Request with RSA - PASSED
cert.sh: Import TestUser45's mixed EC Cert --------------------------
certutil -A -n TestUser45-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser45-ecmixed.cert
cert.sh: #4539: Import TestUser45's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser45's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4540: Generate Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's Request --------------------------
certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw 
cert.sh: #4541: Sign TestUser46's Request - PASSED
cert.sh: Import TestUser46's Cert --------------------------
certutil -A -n TestUser46 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser46.cert
cert.sh: #4542: Import TestUser46's Cert - PASSED
cert.sh SUCCESS: TestUser46's Cert Created
cert.sh: Generate EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4543: Generate EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request --------------------------
certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw 
cert.sh: #4544: Sign TestUser46's EC Request - PASSED
cert.sh: Import TestUser46's EC Cert --------------------------
certutil -A -n TestUser46-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser46-ec.cert
cert.sh: #4545: Import TestUser46's EC Cert - PASSED
cert.sh SUCCESS: TestUser46's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4546: Generate mixed EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw 
cert.sh: #4547: Sign TestUser46's EC Request with RSA - PASSED
cert.sh: Import TestUser46's mixed EC Cert --------------------------
certutil -A -n TestUser46-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser46-ecmixed.cert
cert.sh: #4548: Import TestUser46's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser46's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4549: Generate Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's Request --------------------------
certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw 
cert.sh: #4550: Sign TestUser47's Request - PASSED
cert.sh: Import TestUser47's Cert --------------------------
certutil -A -n TestUser47 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser47.cert
cert.sh: #4551: Import TestUser47's Cert - PASSED
cert.sh SUCCESS: TestUser47's Cert Created
cert.sh: Generate EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4552: Generate EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request --------------------------
certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw 
cert.sh: #4553: Sign TestUser47's EC Request - PASSED
cert.sh: Import TestUser47's EC Cert --------------------------
certutil -A -n TestUser47-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser47-ec.cert
cert.sh: #4554: Import TestUser47's EC Cert - PASSED
cert.sh SUCCESS: TestUser47's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4555: Generate mixed EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw 
cert.sh: #4556: Sign TestUser47's EC Request with RSA - PASSED
cert.sh: Import TestUser47's mixed EC Cert --------------------------
certutil -A -n TestUser47-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser47-ecmixed.cert
cert.sh: #4557: Import TestUser47's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser47's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4558: Generate Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's Request --------------------------
certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw 
cert.sh: #4559: Sign TestUser48's Request - PASSED
cert.sh: Import TestUser48's Cert --------------------------
certutil -A -n TestUser48 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser48.cert
cert.sh: #4560: Import TestUser48's Cert - PASSED
cert.sh SUCCESS: TestUser48's Cert Created
cert.sh: Generate EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4561: Generate EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request --------------------------
certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw 
cert.sh: #4562: Sign TestUser48's EC Request - PASSED
cert.sh: Import TestUser48's EC Cert --------------------------
certutil -A -n TestUser48-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser48-ec.cert
cert.sh: #4563: Import TestUser48's EC Cert - PASSED
cert.sh SUCCESS: TestUser48's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4564: Generate mixed EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw 
cert.sh: #4565: Sign TestUser48's EC Request with RSA - PASSED
cert.sh: Import TestUser48's mixed EC Cert --------------------------
certutil -A -n TestUser48-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser48-ecmixed.cert
cert.sh: #4566: Import TestUser48's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser48's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4567: Generate Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's Request --------------------------
certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw 
cert.sh: #4568: Sign TestUser49's Request - PASSED
cert.sh: Import TestUser49's Cert --------------------------
certutil -A -n TestUser49 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser49.cert
cert.sh: #4569: Import TestUser49's Cert - PASSED
cert.sh SUCCESS: TestUser49's Cert Created
cert.sh: Generate EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4570: Generate EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request --------------------------
certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw 
cert.sh: #4571: Sign TestUser49's EC Request - PASSED
cert.sh: Import TestUser49's EC Cert --------------------------
certutil -A -n TestUser49-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser49-ec.cert
cert.sh: #4572: Import TestUser49's EC Cert - PASSED
cert.sh SUCCESS: TestUser49's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4573: Generate mixed EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw 
cert.sh: #4574: Sign TestUser49's EC Request with RSA - PASSED
cert.sh: Import TestUser49's mixed EC Cert --------------------------
certutil -A -n TestUser49-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser49-ecmixed.cert
cert.sh: #4575: Import TestUser49's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser49's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4576: Generate Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw 
cert.sh: #4577: Sign TestUser50's Request - PASSED
cert.sh: Import TestUser50's Cert --------------------------
certutil -A -n TestUser50 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser50.cert
cert.sh: #4578: Import TestUser50's Cert - PASSED
cert.sh SUCCESS: TestUser50's Cert Created
cert.sh: Generate EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4579: Generate EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw 
cert.sh: #4580: Sign TestUser50's EC Request - PASSED
cert.sh: Import TestUser50's EC Cert --------------------------
certutil -A -n TestUser50-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser50-ec.cert
cert.sh: #4581: Import TestUser50's EC Cert - PASSED
cert.sh SUCCESS: TestUser50's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4582: Generate mixed EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw 
cert.sh: #4583: Sign TestUser50's EC Request with RSA - PASSED
cert.sh: Import TestUser50's mixed EC Cert --------------------------
certutil -A -n TestUser50-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser50-ecmixed.cert
cert.sh: #4584: Import TestUser50's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser50's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4585: Generate Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's Request --------------------------
certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw 
cert.sh: #4586: Sign TestUser51's Request - PASSED
cert.sh: Import TestUser51's Cert --------------------------
certutil -A -n TestUser51 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser51.cert
cert.sh: #4587: Import TestUser51's Cert - PASSED
cert.sh SUCCESS: TestUser51's Cert Created
cert.sh: Generate EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4588: Generate EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request --------------------------
certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw 
cert.sh: #4589: Sign TestUser51's EC Request - PASSED
cert.sh: Import TestUser51's EC Cert --------------------------
certutil -A -n TestUser51-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser51-ec.cert
cert.sh: #4590: Import TestUser51's EC Cert - PASSED
cert.sh SUCCESS: TestUser51's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4591: Generate mixed EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw 
cert.sh: #4592: Sign TestUser51's EC Request with RSA - PASSED
cert.sh: Import TestUser51's mixed EC Cert --------------------------
certutil -A -n TestUser51-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser51-ecmixed.cert
cert.sh: #4593: Import TestUser51's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser51's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4594: Generate Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's Request --------------------------
certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw 
cert.sh: #4595: Sign TestUser52's Request - PASSED
cert.sh: Import TestUser52's Cert --------------------------
certutil -A -n TestUser52 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser52.cert
cert.sh: #4596: Import TestUser52's Cert - PASSED
cert.sh SUCCESS: TestUser52's Cert Created
cert.sh: Generate EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4597: Generate EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request --------------------------
certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw 
cert.sh: #4598: Sign TestUser52's EC Request - PASSED
cert.sh: Import TestUser52's EC Cert --------------------------
certutil -A -n TestUser52-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser52-ec.cert
cert.sh: #4599: Import TestUser52's EC Cert - PASSED
cert.sh SUCCESS: TestUser52's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #4600: Generate mixed EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw 
cert.sh: #4601: Sign TestUser52's EC Request with RSA - PASSED
cert.sh: Import TestUser52's mixed EC Cert --------------------------
certutil -A -n TestUser52-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/client -f ../tests.pw -i TestUser52-ecmixed.cert
cert.sh: #4602: Import TestUser52's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser52's mixed EC Cert Created
cert.sh: Creating CA CRL =====================================
cert.sh: Generating CRL for range 40-42 TestCA authority --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or
cert.sh: #4603: Generating CRL for range 40-42 TestCA authority - PASSED
cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority --------------------------
crlutil -q -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec
cert.sh: #4604: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED
cert.sh: Modifying CA CRL by adding one more cert ============
cert.sh: Modify CRL by adding one more cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or
cert.sh: #4605: Modify CRL by adding one more cert - PASSED
cert.sh: Modify CRL (ECC) by adding one more cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec
cert.sh: #4606: Modify CRL (ECC) by adding one more cert - PASSED
cert.sh: Modifying CA CRL by removing one cert ===============
cert.sh: Modify CRL by removing one cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1
cert.sh: #4607: Modify CRL by removing one cert - PASSED
cert.sh: Modify CRL (ECC) by removing one cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec
cert.sh: #4608: Modify CRL (ECC) by removing one cert - PASSED
cert.sh: Creating CA CRL for groups 1 and 2  ===============
cert.sh: Creating CRL for groups 1 and 2 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42
cert.sh: #4609: Creating CRL for groups 1 and 2 - PASSED
cert.sh: Creating CRL (ECC) for groups 1 and 2 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec
cert.sh: #4610: Creating CRL (ECC) for groups 1 and 2 - PASSED
cert.sh: Creating CA CRL for groups 1, 2 and 3  ===============
cert.sh: Creating CRL for groups 1, 2 and 3 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48
cert.sh: #4611: Creating CRL for groups 1, 2 and 3 - PASSED
cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec
cert.sh: #4612: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED
cert.sh: Importing Server CA Issued CRL for certs  trough 52
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -D -n TestCA -f ../tests.pw -d ../server
crlutil: could not find TestCA's CRL: No matching CRL was found.
crlutil: could not find the issuer TestCA's CRL: No matching CRL was found.
cert.sh: #4613: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server
cert.sh: #4614: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server
crlutil: could not find TestCA-ec's CRL: No matching CRL was found.
crlutil: could not find the issuer TestCA-ec's CRL: No matching CRL was found.
cert.sh: #4615: Importing CRL (ECC) for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server
cert.sh: #4616: Importing CRL (ECC) for groups 1 - PASSED
cert.sh SUCCESS: SSL CRL prep passed
cert.sh cert.sh: finished cert.sh
TIMESTAMP cert END: Tue Nov 27 19:09:26 EST 2012
Running tests for tools
TIMESTAMP tools BEGIN: Tue Nov 27 19:09:26 EST 2012
tools.sh: Tools Tests with ECC ===============================
tools.sh: Exporting Alice's email cert & key - default ciphers
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4617: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                6c:9a:d3:db:e3:6e:3b:0b:05:b1:78:44:69:5e:52:34
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4618: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4619: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's email EC cert & key---------------
pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \
         -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4620: Exporting Alice's email EC cert & key (pk12util -o)  - PASSED
tools.sh: Importing Alice's email EC cert & key --------------
pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4621: Importing Alice's email EC cert & key (pk12util -i)  - PASSED
tools.sh: Listing Alice's pk12 EC file -----------------
pk12util -l Alice-ec.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice-ec

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                28:ef:cb:b8:94:6b:a3:d6:37:9a:1c:a4:cd:37:b5:c6
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Wed Nov 28 00:08:44 2012
            Not After : Tue Nov 28 00:08:44 2062
        Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor
            nia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:23
            EC Public Key:
                PublicValue:
                    04:01:15:92:80:e9:db:d3:38:bd:c8:bf:99:c3:80:bc:
                    ff:f3:6c:74:f2:3b:74:6f:cb:5b:01:75:04:b5:d6:97:
                    3c:a2:56:2c:b9:c1:70:a7:27:26:71:31:16:13:ba:c8:
                    c3:e7:23:a6:7a:6d:a1:a5:6b:b7:72:b8:66:0b:f3:5e:
                    b2:30:00:01:95:dd:bd:58:28:2c:b8:2f:73:f7:12:12:
                    26:54:a9:88:fd:af:53:d7:0b:26:b7:47:eb:cd:11:e5:
                    a1:63:f1:82:15:fe:3a:5d:1f:f0:06:a5:18:b9:b3:e6:
                    79:a3:a4:1c:80:bc:59:8e:fc:d4:08:b6:9f:12:42:fa:
                    ae:f9:b6:5b:fd
                Curve: SECG elliptic curve secp521r1 (aka NIST P-521)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:86:02:41:49:d9:f0:bd:6a:35:31:0b:b6:e8:ee:
        ab:15:bd:4a:af:00:74:3f:e7:14:16:33:06:cf:11:02:
        07:fb:c4:2f:8f:b1:b4:d6:3b:6a:5c:be:98:86:a3:7f:
        b6:a4:57:c1:ee:60:75:f5:1e:58:0c:f7:20:ec:02:ba:
        2e:b5:50:1e:a9:7e:02:41:03:24:a6:19:a1:25:54:1c:
        de:15:5d:fd:57:0e:6c:b5:b8:b9:dc:ad:a8:e9:97:84:
        1e:76:c8:5f:b7:91:a6:fe:c2:48:4b:dd:c9:81:8a:ec:
        b0:13:d4:72:9d:d6:d0:3b:2b:ac:6c:90:de:e5:0e:8e:
        e9:78:3d:e7:0b:15:af:46:18
    Fingerprint (MD5):
        FC:B5:34:5E:1D:61:55:4B:E1:BF:69:D7:AB:45:56:5D
    Fingerprint (SHA1):
        FB:85:73:3F:F0:F0:FC:9C:77:45:3C:44:1C:09:EA:6E:CA:7D:B8:AB

    Friendly Name: TestCA-ec

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S
            T=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:22
            EC Public Key:
                PublicValue:
                    04:e9:2d:81:6c:ab:53:d3:51:f7:da:9e:d8:00:35:06:
                    80:f9:cf:c8:91:bf:9e:32:cc:40:de:bf:49:82:52:93:
                    46:01:09:1c:6b:30:82:ba:c5:1f:bb:06:52:df:e0:19:
                    5f:42:8c:36:3a:27:cc:f8:c0:63:32:fa:cd:ae:2e:a6:
                    06:d3:73:76:bf:20:6c:67:b9:d8:8c:86:81:b8:d7:44:
                    bb:64:c3:1b:90:ef:43:6e:cb:b2:ae:fb:d9:e8:56:ce:
                    ac
                Curve: SECG elliptic curve secp384r1 (aka NIST P-384)
    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:88:02:42:01:16:8d:e0:60:0a:e5:a3:9e:d0:ad:
        4d:a5:2d:c3:1f:3c:84:72:f3:bd:e2:93:fe:05:82:99:
        16:b4:28:65:88:43:4f:e1:ac:87:84:90:1e:be:fe:83:
        fa:50:14:f4:43:51:dd:29:57:41:4e:ec:0a:47:a3:34:
        52:bd:0a:24:22:cb:d8:02:42:01:28:a6:f4:09:6f:b3:
        85:d8:27:f3:36:60:f6:3a:0b:02:57:82:95:ec:37:98:
        57:b0:28:21:c5:e8:d3:3f:84:9b:59:8d:72:cf:06:a5:
        6d:26:13:21:29:55:21:a1:27:39:e2:fa:f3:6a:10:24:
        69:4e:38:d1:c5:99:4b:8c:a8:92:fd
    Fingerprint (MD5):
        D3:B7:2E:33:0C:E1:50:28:B1:14:A4:91:E0:04:CA:B6
    Fingerprint (SHA1):
        39:B3:8E:0E:A8:A3:26:C5:C2:25:60:7B:35:26:A2:6C:CD:AF:09:B6

    Friendly Name: Alice-ec

tools.sh: #4622: Listing Alice's pk12 EC file (pk12util -l)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4623: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                34:96:32:bd:aa:99:e2:34:ef:6a:2e:c0:f3:71:9f:23
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4624: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4625: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4626: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                51:ca:d4:61:cf:0b:5d:79:5c:ce:d5:f5:93:c9:2e:66
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4627: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4628: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4629: Exporting with [RC2-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                53:a9:42:55:da:27:75:fb:36:14:47:a6:ad:f8:31:2a
            Iteration Count: 2000 (0x7d0)
tools.sh: #4630: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4631: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4632: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                dd:29:3f:53:02:07:2e:9d:cf:47:99:e4:42:5f:7d:69
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4633: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4634: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4635: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                f5:19:b5:92:62:d0:79:cb:b6:e4:b1:df:4c:bb:c2:6a
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4636: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4637: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4638: Exporting with [DES-EDE3-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                cb:6d:b7:3b:6e:4c:38:21:c9:08:40:5c:7d:af:c1:51
            Iteration Count: 2000 (0x7d0)
tools.sh: #4639: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4640: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4641: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        08:5c:78:69:0b:6f:b1:3f:66:a3:62:77:27:8d:55:6f
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:09:d6:36:d0:01:11:63:aa:3c:43:08:4a:1b:ff:
                    6d:44
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4642: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4643: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4644: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        93:6f:87:41:a7:f2:3a:c2:02:0e:c6:07:a8:ee:30:42
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:8a:50:7c:9f:60:6a:da:73:fc:bc:bc:bb:74:a5:
                    47:03
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4645: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4646: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4647: Exporting with [AES-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        e5:8e:ec:f3:57:91:23:7f:5c:bf:20:7c:ea:af:62:69
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:16:e2:4a:76:87:b3:75:0f:9f:6d:49:99:fc:99:
                    51:74
tools.sh: #4648: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4649: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4650: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        f5:af:4f:eb:27:45:7f:bb:f1:37:83:43:b2:41:5e:fb
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:59:10:58:7d:45:61:e6:92:36:1b:0c:e9:e5:dd:
                    9c:e4
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4651: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4652: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4653: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        f5:c4:07:12:9f:bb:89:34:36:86:96:bb:12:8a:63:76
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:12:ee:4c:df:6d:88:80:d8:b2:f0:05:c0:40:42:
                    02:d4
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4654: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4655: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4656: Exporting with [AES-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        ba:f6:35:c9:1a:c5:68:d0:36:ff:c9:cd:e8:9e:e7:80
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:23:85:ba:40:d2:41:b7:f5:46:9c:3a:3f:8f:f0:
                    d7:2b
tools.sh: #4657: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4658: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4659: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        ff:76:8e:d9:f1:07:9f:70:83:2f:50:ba:fa:2b:6a:0d
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:b8:b7:cc:69:37:d2:1b:b8:13:78:c9:89:a2:2c:
                    3b:5c
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4660: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4661: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4662: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        41:3c:e7:94:39:60:b0:13:18:58:2e:09:2c:d7:e9:3e
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:79:24:49:35:00:37:d5:b3:3f:cf:34:f1:fe:e1:
                    3f:6d
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4663: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4664: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4665: Exporting with [AES-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        b8:22:32:be:57:21:e9:3b:cd:20:91:70:7a:0d:d4:10
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:2e:3d:1c:5d:76:ad:3d:10:32:31:4c:01:eb:24:
                    b4:4e
tools.sh: #4666: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4667: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4668: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        53:f9:0a:b0:ff:97:3f:3f:f2:5f:75:9f:29:25:d7:f6
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:1c:e0:15:11:c2:64:8e:0e:26:f9:87:c4:51:dc:
                    ac:15
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4669: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4670: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4671: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        e7:48:7b:78:12:09:5f:ee:7c:d9:9a:ed:df:44:66:75
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:5b:91:10:c4:90:51:c3:a7:74:65:05:af:a0:26:
                    41:c3
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4672: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4673: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4674: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        a3:d2:99:fc:8c:5f:94:b0:04:80:d9:93:32:9f:31:bc
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:3a:98:df:5d:59:09:dd:63:98:55:00:17:61:ac:
                    56:7a
tools.sh: #4675: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4676: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4677: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        6a:7b:05:73:55:9f:5c:49:29:8e:d7:66:0b:ee:5d:a4
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:00:19:07:12:a3:cf:1f:c5:4a:5f:cb:c4:b3:1e:
                    e3:70
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4678: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4679: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4680: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        cb:1d:a2:d6:9b:a6:51:de:b5:1c:51:07:97:9e:fe:5c
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:cd:e3:0e:4c:70:9a:cb:4a:87:72:92:1d:24:ea:
                    9b:db
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4681: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4682: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4683: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        de:41:b3:00:fe:84:69:61:e2:c2:37:a8:75:2b:b1:ec
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:c1:d7:eb:f4:f2:0b:31:b0:2d:9a:8a:ec:64:43:
                    9a:f5
tools.sh: #4684: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4685: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4686: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        5d:32:b4:68:8e:06:d2:f0:d6:2a:4d:a5:e6:3c:28:d9
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:81:a1:39:13:7b:d0:76:66:dc:e6:ae:9d:24:cd:
                    02:99
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4687: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4688: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4689: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        1e:b7:3b:75:e5:82:3d:0f:7a:58:89:04:f1:0e:58:46
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:6e:e5:73:98:43:7e:b1:ed:4b:52:87:f2:98:13:
                    c3:72
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4690: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4691: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4692: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        7a:10:30:a9:24:5e:7b:96:d5:cd:bd:fc:e5:ab:6d:6c
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:42:64:83:34:3a:73:ce:81:eb:6a:0a:03:30:bb:
                    32:ae
tools.sh: #4693: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4694: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4695: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                ce:97:53:59:32:94:3c:d9:85:a0:a1:3e:53:c3:92:22
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4696: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4697: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4698: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                23:79:60:25:d0:2d:a7:e4:f7:04:a9:b6:13:c8:21:7a
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4699: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4700: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4701: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                5f:97:ea:11:6a:cc:8c:93:8d:11:e0:32:69:f4:08:e0
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4702: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4703: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4704: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                67:cd:c5:c9:83:6b:48:b0:38:1a:ad:b8:81:99:ef:8b
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4705: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4706: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4707: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                7c:7d:6d:3f:5e:a3:04:a6:d9:e8:e9:1d:11:e4:e6:3c
            Iteration Count: 2000 (0x7d0)
tools.sh: #4708: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4709: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4710: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                ab:e7:11:85:a5:2c:fc:f0:e2:a3:55:4a:dd:a8:53:4a
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4711: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4712: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4713: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                58:b5:b8:a7:e6:f2:91:7f:29:ea:40:93:76:20:79:60
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4714: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4715: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4716: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                28:71:95:bf:da:06:a3:c5:be:63:63:a4:34:a0:8b:a3
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4717: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4718: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4719: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                ab:bb:f0:7e:7a:ab:cd:0e:69:5f:55:24:fb:38:a7:b7
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4720: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4721: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4722: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                b5:96:c7:8a:82:c5:8c:4b:db:b2:bf:6c:3d:b1:cf:56
            Iteration Count: 2000 (0x7d0)
tools.sh: #4723: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4724: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4725: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                6e:0f:ca:02:11:82:0b:76:4b:bd:18:8a:c6:6b:99:c5
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4726: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4727: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4728: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                0f:4e:98:b4:8a:a0:d8:8c:3b:d6:b2:18:0c:93:ba:47
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4729: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4730: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4731: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                e7:08:31:d4:e3:73:39:24:e5:84:1d:3d:42:3f:24:05
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4732: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4733: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4734: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                ae:29:58:9d:54:66:c5:16:33:4f:1d:6f:e7:a7:0a:3f
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4735: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4736: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4737: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                7a:d4:37:0f:28:a2:7e:5f:ff:2f:66:3a:02:5b:7f:4d
            Iteration Count: 2000 (0x7d0)
tools.sh: #4738: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4739: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4740: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                af:09:c3:c3:cd:58:c4:a3:7f:b5:4e:b7:7c:2a:c4:6b
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4741: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4742: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4743: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                bf:97:6f:9c:85:18:d5:e8:6e:01:de:3b:86:99:55:92
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4744: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4745: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4746: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                3e:3b:6c:4a:b9:47:f4:be:3c:6b:f0:67:bd:65:c7:85
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4747: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4748: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4749: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                8c:6d:be:90:7d:22:e6:0c:b4:34:14:91:31:88:d0:12
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4750: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4751: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:null]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4752: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                13:16:36:d7:c8:5e:43:83:06:0a:35:10:76:21:9d:53
            Iteration Count: 2000 (0x7d0)
tools.sh: #4753: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4754: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4755: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                25:08:5c:8d:87:7c:4d:16:8f:cc:6c:6b:9c:b5:18:9a
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4756: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4757: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4758: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                ff:f4:0b:cf:ac:f1:e2:c5:be:4e:de:9c:f8:e6:f6:1b
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4759: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4760: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4761: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                31:4b:96:f1:13:6b:46:ed:4d:68:32:73:10:27:8b:f1
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4762: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4763: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4764: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                9d:c4:2c:c8:2f:00:16:84:5b:4f:d2:78:32:c7:a1:a9
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4765: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4766: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4767: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                d7:eb:2b:b1:f9:ee:32:48:dc:e3:44:8b:99:36:b6:8d
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4768: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4769: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4770: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                12:51:cd:0e:33:17:e8:ac:4d:8e:96:44:e4:86:bd:a4
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4771: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4772: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4773: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                7c:65:9f:1a:0d:d5:14:e0:66:c1:6e:17:6d:9e:ba:af
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4774: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4775: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4776: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                2c:49:12:5f:70:4c:6f:17:41:bf:34:6d:91:33:b9:c2
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4777: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4778: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4779: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                64:6d:9c:2f:02:25:f3:eb:6c:b2:e0:72:56:62:7c:07
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4780: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4781: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4782: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                0f:31:c7:fe:22:52:71:df:ee:ee:56:7c:7e:9c:80:1e
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:43 2012
            Not After : Tue Nov 28 00:08:43 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d4:45:4f:37:d5:cf:d4:f4:7b:65:f5:f2:29:c2:df:a3:
                    4b:7f:39:16:97:38:1f:11:42:31:fc:a6:5e:dc:43:17:
                    5e:9a:25:55:96:2c:2c:95:3c:b5:2c:d7:79:83:10:5b:
                    5c:20:05:0b:26:83:92:7a:16:18:e7:1c:53:e4:14:53:
                    cd:68:9c:f0:42:de:09:bf:f5:4c:9f:9b:0e:32:74:2b:
                    1a:23:91:1b:5e:09:3f:53:7e:08:cd:e9:75:4d:0d:ab:
                    e8:58:94:07:39:74:91:00:16:13:fc:32:8f:eb:c6:cb:
                    8e:63:dd:ab:1a:96:1d:5c:db:00:c7:64:7a:41:a3:69
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:b6:bb:d2:85:f3:49:fd:78:28:4b:58:d9:9b:08:f5:
        7c:f1:8b:70:e2:84:14:d4:da:78:c5:0e:7d:87:26:04:
        6b:52:a7:c0:54:20:98:6b:96:28:6f:cd:79:8a:d0:91:
        88:90:84:ab:e9:50:e6:04:42:97:6e:d6:56:9f:20:99:
        92:9c:b8:13:0b:c3:3f:ed:5e:9d:d1:db:f8:1f:45:66:
        6e:55:3c:2f:90:05:0d:3c:30:86:e8:d3:69:f9:2c:96:
        37:93:9e:66:66:43:53:3a:ef:1b:86:a0:be:f2:f7:1a:
        3b:86:93:33:eb:f5:14:0e:9c:a7:92:a9:a2:5e:3a:e1
    Fingerprint (MD5):
        E1:7A:F6:DE:C4:AA:02:79:5E:C3:7D:4D:42:DE:BD:D8
    Fingerprint (SHA1):
        C0:11:23:B4:DD:54:F9:2C:89:DF:C4:44:F4:39:EE:D7:95:92:95:F7

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:08:49 2012
            Not After : Tue Nov 28 00:08:49 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    de:3c:d0:60:64:ff:e5:ef:18:ad:c9:fe:a9:50:ac:9c:
                    64:36:85:1e:33:71:0f:f7:9e:d1:68:34:a8:8f:e2:f9:
                    bf:0e:59:ac:de:05:88:6b:ee:a9:82:98:78:df:c6:98:
                    4b:84:66:55:4e:af:8d:ef:b3:53:a4:a2:dd:b0:67:86:
                    f6:f4:92:57:a2:c1:34:fe:ea:eb:1b:2f:89:ca:0d:5d:
                    1e:2a:00:84:63:6e:1d:4e:8b:e1:6b:9b:5b:54:ec:5b:
                    06:bf:34:1c:62:62:11:c3:21:ef:2d:3e:ad:ad:22:87:
                    9f:77:15:e8:42:20:00:33:87:ac:8b:2e:bd:49:f9:af
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:ad:68:fe:1d:f8:6f:18:58:8c:73:5b:2f:aa:50:95:
        d3:8a:ce:a9:b3:18:1e:a6:29:ca:a3:9b:40:f5:85:0f:
        b2:74:91:00:39:98:1b:33:3d:0a:d1:10:49:ae:4f:a3:
        89:34:a4:af:03:2a:c2:3c:69:9f:f2:d4:e7:3d:1c:cc:
        69:02:14:7d:3c:25:11:47:8d:d6:a9:2f:9c:c2:e2:26:
        eb:d5:55:12:ee:83:1a:78:84:08:02:e6:25:f7:84:d1:
        6c:e8:cf:31:5a:6f:d8:b6:60:11:f3:af:09:7c:e3:d3:
        c5:e8:4b:09:5c:ee:77:31:f4:3f:0e:ec:0a:1d:ac:31
    Fingerprint (MD5):
        3A:3C:A2:1A:AC:B3:B8:DD:76:24:B7:19:E2:C8:54:40
    Fingerprint (SHA1):
        5E:65:AB:2E:14:EA:87:BD:C2:C7:65:94:D6:16:4C:F3:FB:D2:E5:78

    Friendly Name: Alice

tools.sh: #4783: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #4784: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c null
pk12util: Algorithm: "null": security library: invalid algorithm.
tools.sh: #4785: Exporting with [null:default] (pk12util -o)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #4786: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Create objsign cert -------------------------------
signtool -G "objectsigner" -d ../tools/signdir -p "nss"

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit the browser before continuing this operation. Enter 
"y" to continue, or anything else to abort: 

Enter certificate information.  All fields are optional. Acceptable
characters are numbers, letters, spaces, and apostrophes.
certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair
certificate request generated
certificate has been signed
certificate "objsigner" added to database
Exported certificate to x509.raw and x509.cacert.
tools.sh: #4787: Create objsign cert (signtool -G)  - PASSED
tools.sh: Signing a jar of files ----------------------------
signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> signjs.html
adding ../tools/html/signjs.html to nojs.jar...(deflated 28%)
--> sign.html
adding ../tools/html/sign.html to nojs.jar...(deflated 26%)
Generating zigbert.sf file..
adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%)
adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%)
tree "../tools/html" signed successfully
tools.sh: #4788: Signing a jar of files (signtool -Z)  - PASSED
tools.sh: Listing signed files in jar ----------------------
signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner
archive "nojs.jar" has passed crypto verification.
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match
found a RSA signature file: META-INF/zigbert.rsa

          status   path
    ------------   -------------------
        verified   signjs.html
        verified   sign.html
tools.sh: #4789: Listing signed files in jar (signtool -v)  - PASSED
tools.sh: Show who signed jar ------------------------------
signtool -w nojs.jar -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #4790: Show who signed jar (signtool -w)  - PASSED
tools.sh: Signing a xpi of files ----------------------------
signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> signjs.html
--> sign.html
Generating zigbert.sf file..
Creating XPI Compatible Archive 
adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 33%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%)
--> sign.html
adding ../tools/html/sign.html to nojs.xpi...(deflated 26%)
adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%)
tree "../tools/html" signed successfully
tools.sh: #4791: Signing a xpi of files (signtool -Z -X)  - PASSED
tools.sh: Listing signed files in xpi ----------------------
signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner
archive "nojs.xpi" has passed crypto verification.
found a RSA signature file: META-INF/zigbert.rsa
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match

          status   path
    ------------   -------------------
        verified   signjs.html
        verified   sign.html
tools.sh: #4792: Listing signed files in xpi (signtool -v)  - PASSED
tools.sh: Show who signed xpi ------------------------------
signtool -w nojs.xpi -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #4793: Show who signed xpi (signtool -w)  - PASSED
TIMESTAMP tools END: Tue Nov 27 19:09:36 EST 2012
Running tests for fips
TIMESTAMP fips BEGIN: Tue Nov 27 19:09:36 EST 2012
fips.sh: FIPS 140 Compliance Tests ===============================
fips.sh: Verify this module is in FIPS mode  -----------------
modutil -dbdir ../fips -list

Listing of PKCS #11 Modules
-----------------------------------------------------------
  1. NSS Internal FIPS PKCS #11 Module
 slots: 1 slot attached
status: loaded

 slot: NSS FIPS 140-2 User Private Key Services
token: NSS FIPS 140-2 Certificate DB

  2. RootCerts
library name: /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so
 slots: 1 slot attached
status: loaded

 slot: NSS Builtin Objects
token: Builtin Object Token
-----------------------------------------------------------
FIPS mode enabled.
fips.sh: #4794: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #4795: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys -------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      0d6c6ddc2699e2ed562790036e8f5a6d8570bfef   NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate
fips.sh: #4796: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Attempt to list FIPS module keys with incorrect password
certutil -d ../fips -K -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests.fipsbadpw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
Incorrect password/PIN entered.
certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect.
fips.sh: #4797: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED
certutil -K returned 255
fips.sh: Validate the certificate --------------------------
certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw
certutil: certificate is valid
fips.sh: #4798: Validate the certificate (certutil -V -e) . - PASSED
fips.sh: Export the certificate and key as a PKCS#12 file --
pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 EXPORT SUCCESSFUL
fips.sh: #4799: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED
fips.sh: Export the certificate as a DER-encoded file ------
certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt
fips.sh: #4800: Export the certificate as a DER (certutil -L -r) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #4801: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Delete the certificate and key from the FIPS module
certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw
fips.sh: #4802: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #4803: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys.
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
certutil: no keys found
fips.sh: #4804: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #4805: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #4806: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      0d6c6ddc2699e2ed562790036e8f5a6d8570bfef   FIPS_PUB_140_Test_Certificate
fips.sh: #4807: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Delete the certificate from the FIPS module
certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate
fips.sh: #4808: Delete the certificate from the FIPS module (certutil -D) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #4809: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #4810: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #4811: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      0d6c6ddc2699e2ed562790036e8f5a6d8570bfef   FIPS_PUB_140_Test_Certificate
fips.sh: #4812: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Run PK11MODE in FIPSMODE  -----------------
pk11mode -d ../fips -p fips- -f ../tests.fipspw
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
**** Total number of TESTS ran in FIPS MODE is 106. ****
**** ALL TESTS PASSED ****
fips.sh: #4813: Run PK11MODE in FIPS mode (pk11mode) . - PASSED
fips.sh: Run PK11MODE in Non FIPSMODE  -----------------
pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
**** Total number of TESTS ran in NON FIPS MODE is 104. ****
**** ALL TESTS PASSED ****
fips.sh: #4814: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED
mkdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcertdb.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcrmf.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcryptohi.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libdbm.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libjar.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnspr4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnspr4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssb.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckfw.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdbm3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdbm3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdbm.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdev.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsssysinit.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsssysinit.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssutil3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssutil.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs12.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs7.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcertsel.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixchecker.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcrlsel.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixmodule.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixparams.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixpki.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixresults.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixstore.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixsystem.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixutil.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libplc4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libplc4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libplds4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libplds4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsmime3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsmime.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsqlite3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsqlite.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle
fips.sh: Detect mangled softoken--------------------------
mangling /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle/libsoftokn3.so
mangle -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle/libsoftokn3.so -o -8 -b 5
Changing byte 0x000b28a4 (731300): from 5f (95) to 7f (127)
LD_LIBRARY_PATH=/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/fips/mangle dbtest -r -d ../fips
fips.sh: #4815: Init NSS with a corrupted library (dbtest -r) . - PASSED
fips.sh done
TIMESTAMP fips END: Tue Nov 27 19:09:48 EST 2012
Running tests for ssl
TIMESTAMP ssl BEGIN: Tue Nov 27 19:09:48 EST 2012
ssl.sh: SSL tests ===============================
ssl.sh: CRL SSL Client Tests   - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:09:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:09:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:09:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4816: Waiting for Server - FAILED
kill -0 20440 >/dev/null 2>/dev/null
selfserv with PID 20440 found at Tue Nov 27 19:09:53 EST 2012
selfserv with PID 20440 started at Tue Nov 27 19:09:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4817: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 20440 at Tue Nov 27 19:09:53 EST 2012
kill -USR1 20440
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20440 killed at Tue Nov 27 19:09:53 EST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:09:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:09:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:09:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4818: Waiting for Server - FAILED
kill -0 20508 >/dev/null 2>/dev/null
selfserv with PID 20508 found at Tue Nov 27 19:09:58 EST 2012
selfserv with PID 20508 started at Tue Nov 27 19:09:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4819: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 20508 at Tue Nov 27 19:09:58 EST 2012
kill -USR1 20508
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20508 killed at Tue Nov 27 19:09:58 EST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:09:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:09:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:10:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4820: Waiting for Server - FAILED
kill -0 20576 >/dev/null 2>/dev/null
selfserv with PID 20576 found at Tue Nov 27 19:10:04 EST 2012
selfserv with PID 20576 started at Tue Nov 27 19:10:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4821: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 20576 at Tue Nov 27 19:10:04 EST 2012
kill -USR1 20576
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20576 killed at Tue Nov 27 19:10:04 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:10:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:10:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:10:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4822: Waiting for Server - FAILED
kill -0 20666 >/dev/null 2>/dev/null
selfserv with PID 20666 found at Tue Nov 27 19:10:09 EST 2012
selfserv with PID 20666 started at Tue Nov 27 19:10:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4823: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 20666 at Tue Nov 27 19:10:09 EST 2012
kill -USR1 20666
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20666 killed at Tue Nov 27 19:10:09 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:10:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:10:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:10:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4824: Waiting for Server - FAILED
kill -0 20734 >/dev/null 2>/dev/null
selfserv with PID 20734 found at Tue Nov 27 19:10:14 EST 2012
selfserv with PID 20734 started at Tue Nov 27 19:10:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4825: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 20734 at Tue Nov 27 19:10:14 EST 2012
kill -USR1 20734
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20734 killed at Tue Nov 27 19:10:14 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:10:14 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:10:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:10:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4826: Waiting for Server - FAILED
kill -0 20802 >/dev/null 2>/dev/null
selfserv with PID 20802 found at Tue Nov 27 19:10:19 EST 2012
selfserv with PID 20802 started at Tue Nov 27 19:10:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4827: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 20802 at Tue Nov 27 19:10:19 EST 2012
kill -USR1 20802
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20802 killed at Tue Nov 27 19:10:19 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:10:19 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:10:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:10:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4828: Waiting for Server - FAILED
kill -0 20882 >/dev/null 2>/dev/null
selfserv with PID 20882 found at Tue Nov 27 19:10:24 EST 2012
selfserv with PID 20882 started at Tue Nov 27 19:10:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4829: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 20882 at Tue Nov 27 19:10:24 EST 2012
kill -USR1 20882
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20882 killed at Tue Nov 27 19:10:24 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:10:24 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:10:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:10:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4830: Waiting for Server - FAILED
kill -0 20950 >/dev/null 2>/dev/null
selfserv with PID 20950 found at Tue Nov 27 19:10:29 EST 2012
selfserv with PID 20950 started at Tue Nov 27 19:10:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4831: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 20950 at Tue Nov 27 19:10:29 EST 2012
kill -USR1 20950
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20950 killed at Tue Nov 27 19:10:30 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:10:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:10:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:10:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4832: Waiting for Server - FAILED
kill -0 21018 >/dev/null 2>/dev/null
selfserv with PID 21018 found at Tue Nov 27 19:10:35 EST 2012
selfserv with PID 21018 started at Tue Nov 27 19:10:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4833: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 21018 at Tue Nov 27 19:10:35 EST 2012
kill -USR1 21018
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21018 killed at Tue Nov 27 19:10:35 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:10:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:10:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:10:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4834: Waiting for Server - FAILED
kill -0 21098 >/dev/null 2>/dev/null
selfserv with PID 21098 found at Tue Nov 27 19:10:40 EST 2012
selfserv with PID 21098 started at Tue Nov 27 19:10:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4835: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 21098 at Tue Nov 27 19:10:40 EST 2012
kill -USR1 21098
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21098 killed at Tue Nov 27 19:10:40 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:10:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:10:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:10:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4836: Waiting for Server - FAILED
kill -0 21166 >/dev/null 2>/dev/null
selfserv with PID 21166 found at Tue Nov 27 19:10:45 EST 2012
selfserv with PID 21166 started at Tue Nov 27 19:10:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4837: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 21166 at Tue Nov 27 19:10:45 EST 2012
kill -USR1 21166
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21166 killed at Tue Nov 27 19:10:45 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:10:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:10:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:10:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4838: Waiting for Server - FAILED
kill -0 21234 >/dev/null 2>/dev/null
selfserv with PID 21234 found at Tue Nov 27 19:10:50 EST 2012
selfserv with PID 21234 started at Tue Nov 27 19:10:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4839: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 21234 at Tue Nov 27 19:10:50 EST 2012
kill -USR1 21234
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21234 killed at Tue Nov 27 19:10:50 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:10:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:10:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:10:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4840: Waiting for Server - FAILED
kill -0 21314 >/dev/null 2>/dev/null
selfserv with PID 21314 found at Tue Nov 27 19:10:55 EST 2012
selfserv with PID 21314 started at Tue Nov 27 19:10:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4841: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 21314 at Tue Nov 27 19:10:55 EST 2012
kill -USR1 21314
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21314 killed at Tue Nov 27 19:10:55 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:10:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:10:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:11:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4842: Waiting for Server - FAILED
kill -0 21382 >/dev/null 2>/dev/null
selfserv with PID 21382 found at Tue Nov 27 19:11:00 EST 2012
selfserv with PID 21382 started at Tue Nov 27 19:11:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4843: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 21382 at Tue Nov 27 19:11:00 EST 2012
kill -USR1 21382
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21382 killed at Tue Nov 27 19:11:01 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:11:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:11:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:11:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4844: Waiting for Server - FAILED
kill -0 21450 >/dev/null 2>/dev/null
selfserv with PID 21450 found at Tue Nov 27 19:11:06 EST 2012
selfserv with PID 21450 started at Tue Nov 27 19:11:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4845: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 21450 at Tue Nov 27 19:11:06 EST 2012
kill -USR1 21450
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21450 killed at Tue Nov 27 19:11:06 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:11:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:11:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:11:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4846: Waiting for Server - FAILED
kill -0 21530 >/dev/null 2>/dev/null
selfserv with PID 21530 found at Tue Nov 27 19:11:11 EST 2012
selfserv with PID 21530 started at Tue Nov 27 19:11:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4847: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 21530 at Tue Nov 27 19:11:11 EST 2012
kill -USR1 21530
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21530 killed at Tue Nov 27 19:11:11 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:11:11 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:11:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:11:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4848: Waiting for Server - FAILED
kill -0 21598 >/dev/null 2>/dev/null
selfserv with PID 21598 found at Tue Nov 27 19:11:16 EST 2012
selfserv with PID 21598 started at Tue Nov 27 19:11:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4849: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 21598 at Tue Nov 27 19:11:16 EST 2012
kill -USR1 21598
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21598 killed at Tue Nov 27 19:11:16 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:11:16 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:11:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:11:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4850: Waiting for Server - FAILED
kill -0 21666 >/dev/null 2>/dev/null
selfserv with PID 21666 found at Tue Nov 27 19:11:21 EST 2012
selfserv with PID 21666 started at Tue Nov 27 19:11:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4851: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 21666 at Tue Nov 27 19:11:21 EST 2012
kill -USR1 21666
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21666 killed at Tue Nov 27 19:11:21 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:11:21 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:11:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:11:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4852: Waiting for Server - FAILED
kill -0 21746 >/dev/null 2>/dev/null
selfserv with PID 21746 found at Tue Nov 27 19:11:26 EST 2012
selfserv with PID 21746 started at Tue Nov 27 19:11:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4853: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 21746 at Tue Nov 27 19:11:26 EST 2012
kill -USR1 21746
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21746 killed at Tue Nov 27 19:11:26 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:11:26 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:11:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:11:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4854: Waiting for Server - FAILED
kill -0 21814 >/dev/null 2>/dev/null
selfserv with PID 21814 found at Tue Nov 27 19:11:32 EST 2012
selfserv with PID 21814 started at Tue Nov 27 19:11:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4855: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 21814 at Tue Nov 27 19:11:32 EST 2012
kill -USR1 21814
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21814 killed at Tue Nov 27 19:11:32 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:11:32 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:11:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:11:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4856: Waiting for Server - FAILED
kill -0 21882 >/dev/null 2>/dev/null
selfserv with PID 21882 found at Tue Nov 27 19:11:37 EST 2012
selfserv with PID 21882 started at Tue Nov 27 19:11:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4857: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 21882 at Tue Nov 27 19:11:37 EST 2012
kill -USR1 21882
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21882 killed at Tue Nov 27 19:11:37 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:11:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:11:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:11:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4858: Waiting for Server - FAILED
kill -0 21962 >/dev/null 2>/dev/null
selfserv with PID 21962 found at Tue Nov 27 19:11:42 EST 2012
selfserv with PID 21962 started at Tue Nov 27 19:11:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4859: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 21962 at Tue Nov 27 19:11:42 EST 2012
kill -USR1 21962
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21962 killed at Tue Nov 27 19:11:42 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:11:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:11:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:11:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4860: Waiting for Server - FAILED
kill -0 22030 >/dev/null 2>/dev/null
selfserv with PID 22030 found at Tue Nov 27 19:11:47 EST 2012
selfserv with PID 22030 started at Tue Nov 27 19:11:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4861: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 22030 at Tue Nov 27 19:11:47 EST 2012
kill -USR1 22030
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22030 killed at Tue Nov 27 19:11:47 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:11:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:11:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:11:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4862: Waiting for Server - FAILED
kill -0 22098 >/dev/null 2>/dev/null
selfserv with PID 22098 found at Tue Nov 27 19:11:52 EST 2012
selfserv with PID 22098 started at Tue Nov 27 19:11:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4863: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 22098 at Tue Nov 27 19:11:52 EST 2012
kill -USR1 22098
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22098 killed at Tue Nov 27 19:11:52 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:11:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:11:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:11:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4864: Waiting for Server - FAILED
kill -0 22178 >/dev/null 2>/dev/null
selfserv with PID 22178 found at Tue Nov 27 19:11:57 EST 2012
selfserv with PID 22178 started at Tue Nov 27 19:11:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4865: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 22178 at Tue Nov 27 19:11:57 EST 2012
kill -USR1 22178
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22178 killed at Tue Nov 27 19:11:57 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:11:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:11:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:12:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4866: Waiting for Server - FAILED
kill -0 22246 >/dev/null 2>/dev/null
selfserv with PID 22246 found at Tue Nov 27 19:12:03 EST 2012
selfserv with PID 22246 started at Tue Nov 27 19:12:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4867: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 22246 at Tue Nov 27 19:12:03 EST 2012
kill -USR1 22246
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22246 killed at Tue Nov 27 19:12:03 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:12:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:12:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:12:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4868: Waiting for Server - FAILED
kill -0 22325 >/dev/null 2>/dev/null
selfserv with PID 22325 found at Tue Nov 27 19:12:08 EST 2012
selfserv with PID 22325 started at Tue Nov 27 19:12:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4869: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 22325 at Tue Nov 27 19:12:08 EST 2012
kill -USR1 22325
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22325 killed at Tue Nov 27 19:12:08 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:12:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:12:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:12:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4870: Waiting for Server - FAILED
kill -0 22405 >/dev/null 2>/dev/null
selfserv with PID 22405 found at Tue Nov 27 19:12:13 EST 2012
selfserv with PID 22405 started at Tue Nov 27 19:12:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4871: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 22405 at Tue Nov 27 19:12:13 EST 2012
kill -USR1 22405
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22405 killed at Tue Nov 27 19:12:13 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:12:13 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:12:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:12:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4872: Waiting for Server - FAILED
kill -0 22473 >/dev/null 2>/dev/null
selfserv with PID 22473 found at Tue Nov 27 19:12:18 EST 2012
selfserv with PID 22473 started at Tue Nov 27 19:12:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4873: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 22473 at Tue Nov 27 19:12:18 EST 2012
kill -USR1 22473
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22473 killed at Tue Nov 27 19:12:18 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:12:18 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:12:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:12:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4874: Waiting for Server - FAILED
kill -0 22541 >/dev/null 2>/dev/null
selfserv with PID 22541 found at Tue Nov 27 19:12:23 EST 2012
selfserv with PID 22541 started at Tue Nov 27 19:12:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4875: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 22541 at Tue Nov 27 19:12:23 EST 2012
kill -USR1 22541
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22541 killed at Tue Nov 27 19:12:23 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:12:23 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:12:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:12:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4876: Waiting for Server - FAILED
kill -0 22621 >/dev/null 2>/dev/null
selfserv with PID 22621 found at Tue Nov 27 19:12:28 EST 2012
selfserv with PID 22621 started at Tue Nov 27 19:12:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4877: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 22621 at Tue Nov 27 19:12:28 EST 2012
kill -USR1 22621
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22621 killed at Tue Nov 27 19:12:28 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:12:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:12:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:12:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4878: Waiting for Server - FAILED
kill -0 22689 >/dev/null 2>/dev/null
selfserv with PID 22689 found at Tue Nov 27 19:12:33 EST 2012
selfserv with PID 22689 started at Tue Nov 27 19:12:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4879: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 22689 at Tue Nov 27 19:12:34 EST 2012
kill -USR1 22689
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22689 killed at Tue Nov 27 19:12:34 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:12:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:12:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:12:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4880: Waiting for Server - FAILED
kill -0 22757 >/dev/null 2>/dev/null
selfserv with PID 22757 found at Tue Nov 27 19:12:39 EST 2012
selfserv with PID 22757 started at Tue Nov 27 19:12:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4881: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 22757 at Tue Nov 27 19:12:39 EST 2012
kill -USR1 22757
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22757 killed at Tue Nov 27 19:12:39 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:12:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:12:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:12:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4882: Waiting for Server - FAILED
kill -0 22837 >/dev/null 2>/dev/null
selfserv with PID 22837 found at Tue Nov 27 19:12:44 EST 2012
selfserv with PID 22837 started at Tue Nov 27 19:12:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4883: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 22837 at Tue Nov 27 19:12:44 EST 2012
kill -USR1 22837
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22837 killed at Tue Nov 27 19:12:44 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:12:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:12:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:12:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4884: Waiting for Server - FAILED
kill -0 22905 >/dev/null 2>/dev/null
selfserv with PID 22905 found at Tue Nov 27 19:12:49 EST 2012
selfserv with PID 22905 started at Tue Nov 27 19:12:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4885: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 22905 at Tue Nov 27 19:12:49 EST 2012
kill -USR1 22905
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22905 killed at Tue Nov 27 19:12:49 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:12:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:12:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:12:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4886: Waiting for Server - FAILED
kill -0 22973 >/dev/null 2>/dev/null
selfserv with PID 22973 found at Tue Nov 27 19:12:54 EST 2012
selfserv with PID 22973 started at Tue Nov 27 19:12:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4887: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 254 - FAILED
trying to kill selfserv with PID 22973 at Tue Nov 27 19:12:54 EST 2012
kill -USR1 22973
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22973 killed at Tue Nov 27 19:12:54 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:12:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:12:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:12:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4888: Waiting for Server - FAILED
kill -0 23053 >/dev/null 2>/dev/null
selfserv with PID 23053 found at Tue Nov 27 19:12:59 EST 2012
selfserv with PID 23053 started at Tue Nov 27 19:12:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4889: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 23053 at Tue Nov 27 19:12:59 EST 2012
kill -USR1 23053
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23053 killed at Tue Nov 27 19:12:59 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:12:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:12:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:13:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4890: Waiting for Server - FAILED
kill -0 23121 >/dev/null 2>/dev/null
selfserv with PID 23121 found at Tue Nov 27 19:13:04 EST 2012
selfserv with PID 23121 started at Tue Nov 27 19:13:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4891: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 23121 at Tue Nov 27 19:13:05 EST 2012
kill -USR1 23121
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23121 killed at Tue Nov 27 19:13:05 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:13:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4892: Waiting for Server - FAILED
kill -0 23189 >/dev/null 2>/dev/null
selfserv with PID 23189 found at Tue Nov 27 19:13:10 EST 2012
selfserv with PID 23189 started at Tue Nov 27 19:13:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4893: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 23189 at Tue Nov 27 19:13:10 EST 2012
kill -USR1 23189
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23189 killed at Tue Nov 27 19:13:10 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:10 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:13:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4894: Waiting for Server - FAILED
kill -0 23269 >/dev/null 2>/dev/null
selfserv with PID 23269 found at Tue Nov 27 19:13:15 EST 2012
selfserv with PID 23269 started at Tue Nov 27 19:13:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4895: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 23269 at Tue Nov 27 19:13:15 EST 2012
kill -USR1 23269
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23269 killed at Tue Nov 27 19:13:15 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:15 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:13:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4896: Waiting for Server - FAILED
kill -0 23337 >/dev/null 2>/dev/null
selfserv with PID 23337 found at Tue Nov 27 19:13:20 EST 2012
selfserv with PID 23337 started at Tue Nov 27 19:13:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4897: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 23337 at Tue Nov 27 19:13:20 EST 2012
kill -USR1 23337
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23337 killed at Tue Nov 27 19:13:20 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:20 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:13:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4898: Waiting for Server - FAILED
kill -0 23405 >/dev/null 2>/dev/null
selfserv with PID 23405 found at Tue Nov 27 19:13:25 EST 2012
selfserv with PID 23405 started at Tue Nov 27 19:13:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4899: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 23405 at Tue Nov 27 19:13:25 EST 2012
kill -USR1 23405
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23405 killed at Tue Nov 27 19:13:25 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:25 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:13:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4900: Waiting for Server - FAILED
kill -0 23485 >/dev/null 2>/dev/null
selfserv with PID 23485 found at Tue Nov 27 19:13:30 EST 2012
selfserv with PID 23485 started at Tue Nov 27 19:13:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4901: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23485 at Tue Nov 27 19:13:30 EST 2012
kill -USR1 23485
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23485 killed at Tue Nov 27 19:13:30 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:13:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4902: Waiting for Server - FAILED
kill -0 23553 >/dev/null 2>/dev/null
selfserv with PID 23553 found at Tue Nov 27 19:13:35 EST 2012
selfserv with PID 23553 started at Tue Nov 27 19:13:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
ssl.sh: #4903: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 0 - FAILED
trying to kill selfserv with PID 23553 at Tue Nov 27 19:13:35 EST 2012
kill -USR1 23553
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23553 killed at Tue Nov 27 19:13:35 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: error looking up host: A directory lookup on a network address has failed
retrying to connect to selfserv at Tue Nov 27 19:13:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23621 >/dev/null 2>/dev/null
selfserv with PID 23621 found at Tue Nov 27 19:13:41 EST 2012
selfserv with PID 23621 started at Tue Nov 27 19:13:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4904: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23621 at Tue Nov 27 19:13:41 EST 2012
kill -USR1 23621
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23621 killed at Tue Nov 27 19:13:41 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23693 >/dev/null 2>/dev/null
selfserv with PID 23693 found at Tue Nov 27 19:13:41 EST 2012
selfserv with PID 23693 started at Tue Nov 27 19:13:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4905: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23693 at Tue Nov 27 19:13:41 EST 2012
kill -USR1 23693
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23693 killed at Tue Nov 27 19:13:41 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23749 >/dev/null 2>/dev/null
selfserv with PID 23749 found at Tue Nov 27 19:13:41 EST 2012
selfserv with PID 23749 started at Tue Nov 27 19:13:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4906: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23749 at Tue Nov 27 19:13:41 EST 2012
kill -USR1 23749
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23749 killed at Tue Nov 27 19:13:41 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23805 >/dev/null 2>/dev/null
selfserv with PID 23805 found at Tue Nov 27 19:13:41 EST 2012
selfserv with PID 23805 started at Tue Nov 27 19:13:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4907: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23805 at Tue Nov 27 19:13:41 EST 2012
kill -USR1 23805
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23805 killed at Tue Nov 27 19:13:41 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23873 >/dev/null 2>/dev/null
selfserv with PID 23873 found at Tue Nov 27 19:13:41 EST 2012
selfserv with PID 23873 started at Tue Nov 27 19:13:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4908: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23873 at Tue Nov 27 19:13:41 EST 2012
kill -USR1 23873
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23873 killed at Tue Nov 27 19:13:41 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23929 >/dev/null 2>/dev/null
selfserv with PID 23929 found at Tue Nov 27 19:13:41 EST 2012
selfserv with PID 23929 started at Tue Nov 27 19:13:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4909: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23929 at Tue Nov 27 19:13:42 EST 2012
kill -USR1 23929
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23929 killed at Tue Nov 27 19:13:42 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23985 >/dev/null 2>/dev/null
selfserv with PID 23985 found at Tue Nov 27 19:13:42 EST 2012
selfserv with PID 23985 started at Tue Nov 27 19:13:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4910: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23985 at Tue Nov 27 19:13:42 EST 2012
kill -USR1 23985
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23985 killed at Tue Nov 27 19:13:42 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24053 >/dev/null 2>/dev/null
selfserv with PID 24053 found at Tue Nov 27 19:13:42 EST 2012
selfserv with PID 24053 started at Tue Nov 27 19:13:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4911: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24053 at Tue Nov 27 19:13:42 EST 2012
kill -USR1 24053
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24053 killed at Tue Nov 27 19:13:42 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24109 >/dev/null 2>/dev/null
selfserv with PID 24109 found at Tue Nov 27 19:13:42 EST 2012
selfserv with PID 24109 started at Tue Nov 27 19:13:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4912: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24109 at Tue Nov 27 19:13:42 EST 2012
kill -USR1 24109
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24109 killed at Tue Nov 27 19:13:42 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24165 >/dev/null 2>/dev/null
selfserv with PID 24165 found at Tue Nov 27 19:13:42 EST 2012
selfserv with PID 24165 started at Tue Nov 27 19:13:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4913: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24165 at Tue Nov 27 19:13:42 EST 2012
kill -USR1 24165
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24165 killed at Tue Nov 27 19:13:42 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24233 >/dev/null 2>/dev/null
selfserv with PID 24233 found at Tue Nov 27 19:13:42 EST 2012
selfserv with PID 24233 started at Tue Nov 27 19:13:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4914: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24233 at Tue Nov 27 19:13:43 EST 2012
kill -USR1 24233
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24233 killed at Tue Nov 27 19:13:43 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24289 >/dev/null 2>/dev/null
selfserv with PID 24289 found at Tue Nov 27 19:13:43 EST 2012
selfserv with PID 24289 started at Tue Nov 27 19:13:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4915: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24289 at Tue Nov 27 19:13:43 EST 2012
kill -USR1 24289
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24289 killed at Tue Nov 27 19:13:43 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24345 >/dev/null 2>/dev/null
selfserv with PID 24345 found at Tue Nov 27 19:13:43 EST 2012
selfserv with PID 24345 started at Tue Nov 27 19:13:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4916: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24345 at Tue Nov 27 19:13:43 EST 2012
kill -USR1 24345
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24345 killed at Tue Nov 27 19:13:43 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24413 >/dev/null 2>/dev/null
selfserv with PID 24413 found at Tue Nov 27 19:13:43 EST 2012
selfserv with PID 24413 started at Tue Nov 27 19:13:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4917: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24413 at Tue Nov 27 19:13:43 EST 2012
kill -USR1 24413
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24413 killed at Tue Nov 27 19:13:43 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24469 >/dev/null 2>/dev/null
selfserv with PID 24469 found at Tue Nov 27 19:13:43 EST 2012
selfserv with PID 24469 started at Tue Nov 27 19:13:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4918: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24469 at Tue Nov 27 19:13:43 EST 2012
kill -USR1 24469
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24469 killed at Tue Nov 27 19:13:43 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24525 >/dev/null 2>/dev/null
selfserv with PID 24525 found at Tue Nov 27 19:13:43 EST 2012
selfserv with PID 24525 started at Tue Nov 27 19:13:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4919: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24525 at Tue Nov 27 19:13:44 EST 2012
kill -USR1 24525
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24525 killed at Tue Nov 27 19:13:44 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24593 >/dev/null 2>/dev/null
selfserv with PID 24593 found at Tue Nov 27 19:13:44 EST 2012
selfserv with PID 24593 started at Tue Nov 27 19:13:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4920: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24593 at Tue Nov 27 19:13:44 EST 2012
kill -USR1 24593
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24593 killed at Tue Nov 27 19:13:44 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24649 >/dev/null 2>/dev/null
selfserv with PID 24649 found at Tue Nov 27 19:13:44 EST 2012
selfserv with PID 24649 started at Tue Nov 27 19:13:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4921: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24649 at Tue Nov 27 19:13:44 EST 2012
kill -USR1 24649
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24649 killed at Tue Nov 27 19:13:44 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24705 >/dev/null 2>/dev/null
selfserv with PID 24705 found at Tue Nov 27 19:13:44 EST 2012
selfserv with PID 24705 started at Tue Nov 27 19:13:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4922: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24705 at Tue Nov 27 19:13:44 EST 2012
kill -USR1 24705
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24705 killed at Tue Nov 27 19:13:44 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24773 >/dev/null 2>/dev/null
selfserv with PID 24773 found at Tue Nov 27 19:13:44 EST 2012
selfserv with PID 24773 started at Tue Nov 27 19:13:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4923: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24773 at Tue Nov 27 19:13:45 EST 2012
kill -USR1 24773
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24773 killed at Tue Nov 27 19:13:45 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24829 >/dev/null 2>/dev/null
selfserv with PID 24829 found at Tue Nov 27 19:13:45 EST 2012
selfserv with PID 24829 started at Tue Nov 27 19:13:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4924: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24829 at Tue Nov 27 19:13:45 EST 2012
kill -USR1 24829
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24829 killed at Tue Nov 27 19:13:45 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24885 >/dev/null 2>/dev/null
selfserv with PID 24885 found at Tue Nov 27 19:13:45 EST 2012
selfserv with PID 24885 started at Tue Nov 27 19:13:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4925: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24885 at Tue Nov 27 19:13:45 EST 2012
kill -USR1 24885
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24885 killed at Tue Nov 27 19:13:45 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24953 >/dev/null 2>/dev/null
selfserv with PID 24953 found at Tue Nov 27 19:13:45 EST 2012
selfserv with PID 24953 started at Tue Nov 27 19:13:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4926: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24953 at Tue Nov 27 19:13:45 EST 2012
kill -USR1 24953
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24953 killed at Tue Nov 27 19:13:45 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25009 >/dev/null 2>/dev/null
selfserv with PID 25009 found at Tue Nov 27 19:13:45 EST 2012
selfserv with PID 25009 started at Tue Nov 27 19:13:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4927: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25009 at Tue Nov 27 19:13:45 EST 2012
kill -USR1 25009
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25009 killed at Tue Nov 27 19:13:45 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25065 >/dev/null 2>/dev/null
selfserv with PID 25065 found at Tue Nov 27 19:13:45 EST 2012
selfserv with PID 25065 started at Tue Nov 27 19:13:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4928: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25065 at Tue Nov 27 19:13:46 EST 2012
kill -USR1 25065
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25065 killed at Tue Nov 27 19:13:46 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25133 >/dev/null 2>/dev/null
selfserv with PID 25133 found at Tue Nov 27 19:13:46 EST 2012
selfserv with PID 25133 started at Tue Nov 27 19:13:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4929: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25133 at Tue Nov 27 19:13:46 EST 2012
kill -USR1 25133
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25133 killed at Tue Nov 27 19:13:46 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25189 >/dev/null 2>/dev/null
selfserv with PID 25189 found at Tue Nov 27 19:13:46 EST 2012
selfserv with PID 25189 started at Tue Nov 27 19:13:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4930: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25189 at Tue Nov 27 19:13:46 EST 2012
kill -USR1 25189
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25189 killed at Tue Nov 27 19:13:46 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25245 >/dev/null 2>/dev/null
selfserv with PID 25245 found at Tue Nov 27 19:13:46 EST 2012
selfserv with PID 25245 started at Tue Nov 27 19:13:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4931: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25245 at Tue Nov 27 19:13:46 EST 2012
kill -USR1 25245
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25245 killed at Tue Nov 27 19:13:46 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25313 >/dev/null 2>/dev/null
selfserv with PID 25313 found at Tue Nov 27 19:13:46 EST 2012
selfserv with PID 25313 started at Tue Nov 27 19:13:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4932: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25313 at Tue Nov 27 19:13:46 EST 2012
kill -USR1 25313
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25313 killed at Tue Nov 27 19:13:46 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25369 >/dev/null 2>/dev/null
selfserv with PID 25369 found at Tue Nov 27 19:13:46 EST 2012
selfserv with PID 25369 started at Tue Nov 27 19:13:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4933: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25369 at Tue Nov 27 19:13:47 EST 2012
kill -USR1 25369
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25369 killed at Tue Nov 27 19:13:47 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25425 >/dev/null 2>/dev/null
selfserv with PID 25425 found at Tue Nov 27 19:13:47 EST 2012
selfserv with PID 25425 started at Tue Nov 27 19:13:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4934: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25425 at Tue Nov 27 19:13:47 EST 2012
kill -USR1 25425
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25425 killed at Tue Nov 27 19:13:47 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25493 >/dev/null 2>/dev/null
selfserv with PID 25493 found at Tue Nov 27 19:13:47 EST 2012
selfserv with PID 25493 started at Tue Nov 27 19:13:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4935: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25493 at Tue Nov 27 19:13:47 EST 2012
kill -USR1 25493
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25493 killed at Tue Nov 27 19:13:47 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25549 >/dev/null 2>/dev/null
selfserv with PID 25549 found at Tue Nov 27 19:13:47 EST 2012
selfserv with PID 25549 started at Tue Nov 27 19:13:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4936: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25549 at Tue Nov 27 19:13:47 EST 2012
kill -USR1 25549
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25549 killed at Tue Nov 27 19:13:47 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25605 >/dev/null 2>/dev/null
selfserv with PID 25605 found at Tue Nov 27 19:13:47 EST 2012
selfserv with PID 25605 started at Tue Nov 27 19:13:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4937: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25605 at Tue Nov 27 19:13:47 EST 2012
kill -USR1 25605
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25605 killed at Tue Nov 27 19:13:47 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25673 >/dev/null 2>/dev/null
selfserv with PID 25673 found at Tue Nov 27 19:13:48 EST 2012
selfserv with PID 25673 started at Tue Nov 27 19:13:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4938: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25673 at Tue Nov 27 19:13:48 EST 2012
kill -USR1 25673
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25673 killed at Tue Nov 27 19:13:48 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25729 >/dev/null 2>/dev/null
selfserv with PID 25729 found at Tue Nov 27 19:13:48 EST 2012
selfserv with PID 25729 started at Tue Nov 27 19:13:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4939: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25729 at Tue Nov 27 19:13:48 EST 2012
kill -USR1 25729
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25729 killed at Tue Nov 27 19:13:48 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25785 >/dev/null 2>/dev/null
selfserv with PID 25785 found at Tue Nov 27 19:13:48 EST 2012
selfserv with PID 25785 started at Tue Nov 27 19:13:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4940: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25785 at Tue Nov 27 19:13:48 EST 2012
kill -USR1 25785
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25785 killed at Tue Nov 27 19:13:48 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25853 >/dev/null 2>/dev/null
selfserv with PID 25853 found at Tue Nov 27 19:13:48 EST 2012
selfserv with PID 25853 started at Tue Nov 27 19:13:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4941: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25853 at Tue Nov 27 19:13:48 EST 2012
kill -USR1 25853
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25853 killed at Tue Nov 27 19:13:48 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25909 >/dev/null 2>/dev/null
selfserv with PID 25909 found at Tue Nov 27 19:13:48 EST 2012
selfserv with PID 25909 started at Tue Nov 27 19:13:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4942: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25909 at Tue Nov 27 19:13:49 EST 2012
kill -USR1 25909
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25909 killed at Tue Nov 27 19:13:49 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:13:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25965 >/dev/null 2>/dev/null
selfserv with PID 25965 found at Tue Nov 27 19:13:49 EST 2012
selfserv with PID 25965 started at Tue Nov 27 19:13:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4943: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25965 at Tue Nov 27 19:13:49 EST 2012
kill -USR1 25965
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25965 killed at Tue Nov 27 19:13:49 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26033 >/dev/null 2>/dev/null
selfserv with PID 26033 found at Tue Nov 27 19:13:49 EST 2012
selfserv with PID 26033 started at Tue Nov 27 19:13:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4944: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26033 at Tue Nov 27 19:13:49 EST 2012
kill -USR1 26033
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26033 killed at Tue Nov 27 19:13:49 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26089 >/dev/null 2>/dev/null
selfserv with PID 26089 found at Tue Nov 27 19:13:49 EST 2012
selfserv with PID 26089 started at Tue Nov 27 19:13:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4945: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26089 at Tue Nov 27 19:13:49 EST 2012
kill -USR1 26089
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26089 killed at Tue Nov 27 19:13:49 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:13:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26145 >/dev/null 2>/dev/null
selfserv with PID 26145 found at Tue Nov 27 19:13:49 EST 2012
selfserv with PID 26145 started at Tue Nov 27 19:13:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4946: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26145 at Tue Nov 27 19:13:49 EST 2012
kill -USR1 26145
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26145 killed at Tue Nov 27 19:13:49 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26213 >/dev/null 2>/dev/null
selfserv with PID 26213 found at Tue Nov 27 19:13:49 EST 2012
selfserv with PID 26213 started at Tue Nov 27 19:13:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4947: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26213 at Tue Nov 27 19:13:50 EST 2012
kill -USR1 26213
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26213 killed at Tue Nov 27 19:13:50 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26269 >/dev/null 2>/dev/null
selfserv with PID 26269 found at Tue Nov 27 19:13:50 EST 2012
selfserv with PID 26269 started at Tue Nov 27 19:13:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4948: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26269 at Tue Nov 27 19:13:50 EST 2012
kill -USR1 26269
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26269 killed at Tue Nov 27 19:13:50 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:13:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:13:50 EST 2012
selfserv with PID 26325 started at Tue Nov 27 19:13:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4949: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26325 at Tue Nov 27 19:13:50 EST 2012
kill -USR1 26325
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26325 killed at Tue Nov 27 19:13:50 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26402 >/dev/null 2>/dev/null
selfserv with PID 26402 found at Tue Nov 27 19:13:50 EST 2012
selfserv with PID 26402 started at Tue Nov 27 19:13:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4950: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26402 at Tue Nov 27 19:13:50 EST 2012
kill -USR1 26402
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26402 killed at Tue Nov 27 19:13:50 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26458 >/dev/null 2>/dev/null
selfserv with PID 26458 found at Tue Nov 27 19:13:50 EST 2012
selfserv with PID 26458 started at Tue Nov 27 19:13:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4951: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26458 at Tue Nov 27 19:13:50 EST 2012
kill -USR1 26458
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26458 killed at Tue Nov 27 19:13:50 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26514 >/dev/null 2>/dev/null
selfserv with PID 26514 found at Tue Nov 27 19:13:50 EST 2012
selfserv with PID 26514 started at Tue Nov 27 19:13:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4952: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26514 at Tue Nov 27 19:13:51 EST 2012
kill -USR1 26514
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26514 killed at Tue Nov 27 19:13:51 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26582 >/dev/null 2>/dev/null
selfserv with PID 26582 found at Tue Nov 27 19:13:51 EST 2012
selfserv with PID 26582 started at Tue Nov 27 19:13:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4953: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 26582 at Tue Nov 27 19:13:51 EST 2012
kill -USR1 26582
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26582 killed at Tue Nov 27 19:13:51 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26638 >/dev/null 2>/dev/null
selfserv with PID 26638 found at Tue Nov 27 19:13:51 EST 2012
selfserv with PID 26638 started at Tue Nov 27 19:13:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4954: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26638 at Tue Nov 27 19:13:51 EST 2012
kill -USR1 26638
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26638 killed at Tue Nov 27 19:13:51 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26694 >/dev/null 2>/dev/null
selfserv with PID 26694 found at Tue Nov 27 19:13:51 EST 2012
selfserv with PID 26694 started at Tue Nov 27 19:13:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4955: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 26694 at Tue Nov 27 19:13:51 EST 2012
kill -USR1 26694
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26694 killed at Tue Nov 27 19:13:51 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26762 >/dev/null 2>/dev/null
selfserv with PID 26762 found at Tue Nov 27 19:13:51 EST 2012
selfserv with PID 26762 started at Tue Nov 27 19:13:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4956: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 26762 at Tue Nov 27 19:13:52 EST 2012
kill -USR1 26762
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26762 killed at Tue Nov 27 19:13:52 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26818 >/dev/null 2>/dev/null
selfserv with PID 26818 found at Tue Nov 27 19:13:52 EST 2012
selfserv with PID 26818 started at Tue Nov 27 19:13:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4957: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 26818 at Tue Nov 27 19:13:52 EST 2012
kill -USR1 26818
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26818 killed at Tue Nov 27 19:13:52 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26874 >/dev/null 2>/dev/null
selfserv with PID 26874 found at Tue Nov 27 19:13:52 EST 2012
selfserv with PID 26874 started at Tue Nov 27 19:13:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4958: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 26874 at Tue Nov 27 19:13:52 EST 2012
kill -USR1 26874
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26874 killed at Tue Nov 27 19:13:52 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26942 >/dev/null 2>/dev/null
selfserv with PID 26942 found at Tue Nov 27 19:13:52 EST 2012
selfserv with PID 26942 started at Tue Nov 27 19:13:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4959: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 26942 at Tue Nov 27 19:13:52 EST 2012
kill -USR1 26942
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26942 killed at Tue Nov 27 19:13:52 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26998 >/dev/null 2>/dev/null
selfserv with PID 26998 found at Tue Nov 27 19:13:52 EST 2012
selfserv with PID 26998 started at Tue Nov 27 19:13:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4960: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26998 at Tue Nov 27 19:13:53 EST 2012
kill -USR1 26998
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26998 killed at Tue Nov 27 19:13:53 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27054 >/dev/null 2>/dev/null
selfserv with PID 27054 found at Tue Nov 27 19:13:53 EST 2012
selfserv with PID 27054 started at Tue Nov 27 19:13:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4961: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 27054 at Tue Nov 27 19:13:53 EST 2012
kill -USR1 27054
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27054 killed at Tue Nov 27 19:13:53 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27122 >/dev/null 2>/dev/null
selfserv with PID 27122 found at Tue Nov 27 19:13:53 EST 2012
selfserv with PID 27122 started at Tue Nov 27 19:13:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4962: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27122 at Tue Nov 27 19:13:53 EST 2012
kill -USR1 27122
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27122 killed at Tue Nov 27 19:13:53 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27178 >/dev/null 2>/dev/null
selfserv with PID 27178 found at Tue Nov 27 19:13:53 EST 2012
selfserv with PID 27178 started at Tue Nov 27 19:13:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4963: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27178 at Tue Nov 27 19:13:53 EST 2012
kill -USR1 27178
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27178 killed at Tue Nov 27 19:13:53 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27235 >/dev/null 2>/dev/null
selfserv with PID 27235 found at Tue Nov 27 19:13:53 EST 2012
selfserv with PID 27235 started at Tue Nov 27 19:13:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4964: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27235 at Tue Nov 27 19:13:53 EST 2012
kill -USR1 27235
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27235 killed at Tue Nov 27 19:13:53 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27303 >/dev/null 2>/dev/null
selfserv with PID 27303 found at Tue Nov 27 19:13:53 EST 2012
selfserv with PID 27303 started at Tue Nov 27 19:13:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4965: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 27303 at Tue Nov 27 19:13:54 EST 2012
kill -USR1 27303
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27303 killed at Tue Nov 27 19:13:54 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27359 >/dev/null 2>/dev/null
selfserv with PID 27359 found at Tue Nov 27 19:13:54 EST 2012
selfserv with PID 27359 started at Tue Nov 27 19:13:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4966: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27359 at Tue Nov 27 19:13:54 EST 2012
kill -USR1 27359
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27359 killed at Tue Nov 27 19:13:54 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27415 >/dev/null 2>/dev/null
selfserv with PID 27415 found at Tue Nov 27 19:13:54 EST 2012
selfserv with PID 27415 started at Tue Nov 27 19:13:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4967: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 27415 at Tue Nov 27 19:13:54 EST 2012
kill -USR1 27415
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27415 killed at Tue Nov 27 19:13:54 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27483 >/dev/null 2>/dev/null
selfserv with PID 27483 found at Tue Nov 27 19:13:54 EST 2012
selfserv with PID 27483 started at Tue Nov 27 19:13:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4968: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 27483 at Tue Nov 27 19:13:54 EST 2012
kill -USR1 27483
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27483 killed at Tue Nov 27 19:13:54 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27539 >/dev/null 2>/dev/null
selfserv with PID 27539 found at Tue Nov 27 19:13:54 EST 2012
selfserv with PID 27539 started at Tue Nov 27 19:13:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4969: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 27539 at Tue Nov 27 19:13:55 EST 2012
kill -USR1 27539
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27539 killed at Tue Nov 27 19:13:55 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Tue Nov 27 19:13:55 EST 2012
selfserv with PID 27595 started at Tue Nov 27 19:13:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #4970: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 27595 at Tue Nov 27 19:13:55 EST 2012
kill -USR1 27595
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27595 killed at Tue Nov 27 19:13:55 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27663 >/dev/null 2>/dev/null
selfserv with PID 27663 found at Tue Nov 27 19:13:55 EST 2012
selfserv with PID 27663 started at Tue Nov 27 19:13:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4971: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 27663 at Tue Nov 27 19:13:55 EST 2012
kill -USR1 27663
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27663 killed at Tue Nov 27 19:13:55 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27719 >/dev/null 2>/dev/null
selfserv with PID 27719 found at Tue Nov 27 19:13:55 EST 2012
selfserv with PID 27719 started at Tue Nov 27 19:13:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4972: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27719 at Tue Nov 27 19:13:55 EST 2012
kill -USR1 27719
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27719 killed at Tue Nov 27 19:13:55 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27775 >/dev/null 2>/dev/null
selfserv with PID 27775 found at Tue Nov 27 19:13:55 EST 2012
selfserv with PID 27775 started at Tue Nov 27 19:13:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #4973: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 27775 at Tue Nov 27 19:13:55 EST 2012
kill -USR1 27775
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27775 killed at Tue Nov 27 19:13:55 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27843 >/dev/null 2>/dev/null
selfserv with PID 27843 found at Tue Nov 27 19:13:56 EST 2012
selfserv with PID 27843 started at Tue Nov 27 19:13:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4974: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27843 at Tue Nov 27 19:13:56 EST 2012
kill -USR1 27843
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27843 killed at Tue Nov 27 19:13:56 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27899 >/dev/null 2>/dev/null
selfserv with PID 27899 found at Tue Nov 27 19:13:56 EST 2012
selfserv with PID 27899 started at Tue Nov 27 19:13:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4975: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27899 at Tue Nov 27 19:13:56 EST 2012
kill -USR1 27899
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27899 killed at Tue Nov 27 19:13:56 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27955 >/dev/null 2>/dev/null
selfserv with PID 27955 found at Tue Nov 27 19:13:56 EST 2012
selfserv with PID 27955 started at Tue Nov 27 19:13:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4976: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27955 at Tue Nov 27 19:13:56 EST 2012
kill -USR1 27955
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27955 killed at Tue Nov 27 19:13:56 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28023 >/dev/null 2>/dev/null
selfserv with PID 28023 found at Tue Nov 27 19:13:56 EST 2012
selfserv with PID 28023 started at Tue Nov 27 19:13:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4977: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28023 at Tue Nov 27 19:13:56 EST 2012
kill -USR1 28023
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28023 killed at Tue Nov 27 19:13:56 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28079 >/dev/null 2>/dev/null
selfserv with PID 28079 found at Tue Nov 27 19:13:56 EST 2012
selfserv with PID 28079 started at Tue Nov 27 19:13:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4978: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28079 at Tue Nov 27 19:13:57 EST 2012
kill -USR1 28079
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28079 killed at Tue Nov 27 19:13:57 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28135 >/dev/null 2>/dev/null
selfserv with PID 28135 found at Tue Nov 27 19:13:57 EST 2012
selfserv with PID 28135 started at Tue Nov 27 19:13:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4979: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28135 at Tue Nov 27 19:13:57 EST 2012
kill -USR1 28135
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28135 killed at Tue Nov 27 19:13:57 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28203 >/dev/null 2>/dev/null
selfserv with PID 28203 found at Tue Nov 27 19:13:57 EST 2012
selfserv with PID 28203 started at Tue Nov 27 19:13:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4980: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28203 at Tue Nov 27 19:13:57 EST 2012
kill -USR1 28203
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28203 killed at Tue Nov 27 19:13:57 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28259 >/dev/null 2>/dev/null
selfserv with PID 28259 found at Tue Nov 27 19:13:57 EST 2012
selfserv with PID 28259 started at Tue Nov 27 19:13:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4981: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28259 at Tue Nov 27 19:13:57 EST 2012
kill -USR1 28259
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28259 killed at Tue Nov 27 19:13:57 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28315 >/dev/null 2>/dev/null
selfserv with PID 28315 found at Tue Nov 27 19:13:57 EST 2012
selfserv with PID 28315 started at Tue Nov 27 19:13:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4982: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28315 at Tue Nov 27 19:13:58 EST 2012
kill -USR1 28315
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28315 killed at Tue Nov 27 19:13:58 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28383 >/dev/null 2>/dev/null
selfserv with PID 28383 found at Tue Nov 27 19:13:58 EST 2012
selfserv with PID 28383 started at Tue Nov 27 19:13:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4983: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28383 at Tue Nov 27 19:13:58 EST 2012
kill -USR1 28383
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28383 killed at Tue Nov 27 19:13:58 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28439 >/dev/null 2>/dev/null
selfserv with PID 28439 found at Tue Nov 27 19:13:58 EST 2012
selfserv with PID 28439 started at Tue Nov 27 19:13:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4984: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28439 at Tue Nov 27 19:13:58 EST 2012
kill -USR1 28439
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28439 killed at Tue Nov 27 19:13:58 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28495 >/dev/null 2>/dev/null
selfserv with PID 28495 found at Tue Nov 27 19:13:58 EST 2012
selfserv with PID 28495 started at Tue Nov 27 19:13:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4985: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28495 at Tue Nov 27 19:13:58 EST 2012
kill -USR1 28495
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28495 killed at Tue Nov 27 19:13:58 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28563 >/dev/null 2>/dev/null
selfserv with PID 28563 found at Tue Nov 27 19:13:58 EST 2012
selfserv with PID 28563 started at Tue Nov 27 19:13:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4986: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28563 at Tue Nov 27 19:13:58 EST 2012
kill -USR1 28563
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28563 killed at Tue Nov 27 19:13:58 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28619 >/dev/null 2>/dev/null
selfserv with PID 28619 found at Tue Nov 27 19:13:58 EST 2012
selfserv with PID 28619 started at Tue Nov 27 19:13:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4987: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28619 at Tue Nov 27 19:13:59 EST 2012
kill -USR1 28619
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28619 killed at Tue Nov 27 19:13:59 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:13:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28675 >/dev/null 2>/dev/null
selfserv with PID 28675 found at Tue Nov 27 19:13:59 EST 2012
selfserv with PID 28675 started at Tue Nov 27 19:13:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4988: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28675 at Tue Nov 27 19:13:59 EST 2012
kill -USR1 28675
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28675 killed at Tue Nov 27 19:13:59 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28743 >/dev/null 2>/dev/null
selfserv with PID 28743 found at Tue Nov 27 19:13:59 EST 2012
selfserv with PID 28743 started at Tue Nov 27 19:13:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4989: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28743 at Tue Nov 27 19:13:59 EST 2012
kill -USR1 28743
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28743 killed at Tue Nov 27 19:13:59 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28800 >/dev/null 2>/dev/null
selfserv with PID 28800 found at Tue Nov 27 19:13:59 EST 2012
selfserv with PID 28800 started at Tue Nov 27 19:13:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4990: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28800 at Tue Nov 27 19:13:59 EST 2012
kill -USR1 28800
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28800 killed at Tue Nov 27 19:13:59 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:13:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:13:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28856 >/dev/null 2>/dev/null
selfserv with PID 28856 found at Tue Nov 27 19:13:59 EST 2012
selfserv with PID 28856 started at Tue Nov 27 19:13:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4991: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28856 at Tue Nov 27 19:14:00 EST 2012
kill -USR1 28856
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28856 killed at Tue Nov 27 19:14:00 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:14:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28924 >/dev/null 2>/dev/null
selfserv with PID 28924 found at Tue Nov 27 19:14:00 EST 2012
selfserv with PID 28924 started at Tue Nov 27 19:14:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4992: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28924 at Tue Nov 27 19:14:00 EST 2012
kill -USR1 28924
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28924 killed at Tue Nov 27 19:14:00 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:14:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28980 >/dev/null 2>/dev/null
selfserv with PID 28980 found at Tue Nov 27 19:14:00 EST 2012
selfserv with PID 28980 started at Tue Nov 27 19:14:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4993: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28980 at Tue Nov 27 19:14:00 EST 2012
kill -USR1 28980
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28980 killed at Tue Nov 27 19:14:00 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:14:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29036 >/dev/null 2>/dev/null
selfserv with PID 29036 found at Tue Nov 27 19:14:00 EST 2012
selfserv with PID 29036 started at Tue Nov 27 19:14:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #4994: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29036 at Tue Nov 27 19:14:00 EST 2012
kill -USR1 29036
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29036 killed at Tue Nov 27 19:14:00 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:14:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29104 >/dev/null 2>/dev/null
selfserv with PID 29104 found at Tue Nov 27 19:14:00 EST 2012
selfserv with PID 29104 started at Tue Nov 27 19:14:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4995: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29104 at Tue Nov 27 19:14:00 EST 2012
kill -USR1 29104
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29104 killed at Tue Nov 27 19:14:00 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:14:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29160 >/dev/null 2>/dev/null
selfserv with PID 29160 found at Tue Nov 27 19:14:00 EST 2012
selfserv with PID 29160 started at Tue Nov 27 19:14:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4996: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29160 at Tue Nov 27 19:14:01 EST 2012
kill -USR1 29160
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29160 killed at Tue Nov 27 19:14:01 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:14:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29216 >/dev/null 2>/dev/null
selfserv with PID 29216 found at Tue Nov 27 19:14:01 EST 2012
selfserv with PID 29216 started at Tue Nov 27 19:14:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #4997: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29216 at Tue Nov 27 19:14:01 EST 2012
kill -USR1 29216
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29216 killed at Tue Nov 27 19:14:01 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:14:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29284 >/dev/null 2>/dev/null
selfserv with PID 29284 found at Tue Nov 27 19:14:01 EST 2012
selfserv with PID 29284 started at Tue Nov 27 19:14:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4998: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29284 at Tue Nov 27 19:14:01 EST 2012
kill -USR1 29284
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29284 killed at Tue Nov 27 19:14:01 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:14:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29340 >/dev/null 2>/dev/null
selfserv with PID 29340 found at Tue Nov 27 19:14:01 EST 2012
selfserv with PID 29340 started at Tue Nov 27 19:14:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #4999: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29340 at Tue Nov 27 19:14:01 EST 2012
kill -USR1 29340
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29340 killed at Tue Nov 27 19:14:01 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:14:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29404 >/dev/null 2>/dev/null
selfserv with PID 29404 found at Tue Nov 27 19:14:01 EST 2012
selfserv with PID 29404 started at Tue Nov 27 19:14:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5000: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29404 at Tue Nov 27 19:14:01 EST 2012
kill -USR1 29404
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29404 killed at Tue Nov 27 19:14:01 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:14:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29474 >/dev/null 2>/dev/null
selfserv with PID 29474 found at Tue Nov 27 19:14:01 EST 2012
selfserv with PID 29474 started at Tue Nov 27 19:14:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #5001: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29474 at Tue Nov 27 19:14:02 EST 2012
kill -USR1 29474
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29474 killed at Tue Nov 27 19:14:02 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:14:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29531 >/dev/null 2>/dev/null
selfserv with PID 29531 found at Tue Nov 27 19:14:02 EST 2012
selfserv with PID 29531 started at Tue Nov 27 19:14:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5002: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29531 at Tue Nov 27 19:14:02 EST 2012
kill -USR1 29531
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29531 killed at Tue Nov 27 19:14:02 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:14:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29587 >/dev/null 2>/dev/null
selfserv with PID 29587 found at Tue Nov 27 19:14:02 EST 2012
selfserv with PID 29587 started at Tue Nov 27 19:14:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #5003: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29587 at Tue Nov 27 19:14:02 EST 2012
kill -USR1 29587
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29587 killed at Tue Nov 27 19:14:02 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:14:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29655 >/dev/null 2>/dev/null
selfserv with PID 29655 found at Tue Nov 27 19:14:02 EST 2012
selfserv with PID 29655 started at Tue Nov 27 19:14:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5004: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29655 at Tue Nov 27 19:14:02 EST 2012
kill -USR1 29655
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29655 killed at Tue Nov 27 19:14:02 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:14:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29711 >/dev/null 2>/dev/null
selfserv with PID 29711 found at Tue Nov 27 19:14:02 EST 2012
selfserv with PID 29711 started at Tue Nov 27 19:14:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5005: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29711 at Tue Nov 27 19:14:03 EST 2012
kill -USR1 29711
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29711 killed at Tue Nov 27 19:14:03 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:14:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29767 >/dev/null 2>/dev/null
selfserv with PID 29767 found at Tue Nov 27 19:14:03 EST 2012
selfserv with PID 29767 started at Tue Nov 27 19:14:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5006: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29767 at Tue Nov 27 19:14:03 EST 2012
kill -USR1 29767
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29767 killed at Tue Nov 27 19:14:03 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:14:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29835 >/dev/null 2>/dev/null
selfserv with PID 29835 found at Tue Nov 27 19:14:03 EST 2012
selfserv with PID 29835 started at Tue Nov 27 19:14:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #5007: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29835 at Tue Nov 27 19:14:03 EST 2012
kill -USR1 29835
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29835 killed at Tue Nov 27 19:14:03 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:14:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29891 >/dev/null 2>/dev/null
selfserv with PID 29891 found at Tue Nov 27 19:14:03 EST 2012
selfserv with PID 29891 started at Tue Nov 27 19:14:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5008: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29891 at Tue Nov 27 19:14:03 EST 2012
kill -USR1 29891
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29891 killed at Tue Nov 27 19:14:03 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:14:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29947 >/dev/null 2>/dev/null
selfserv with PID 29947 found at Tue Nov 27 19:14:03 EST 2012
selfserv with PID 29947 started at Tue Nov 27 19:14:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #5009: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29947 at Tue Nov 27 19:14:04 EST 2012
kill -USR1 29947
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29947 killed at Tue Nov 27 19:14:04 EST 2012
ssl.sh: Cache CRL SSL Client Tests   - with ECC ===============================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/authin.tl.tmp
0
selfserv starting at Tue Nov 27 19:14:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:04 EST 2012
selfserv with PID 30010 started at Tue Nov 27 19:14:04 EST 2012
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:04 EST 2012
ssl.sh: #5010: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:04 EST 2012
ssl.sh: #5011: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:04 EST 2012
ssl.sh: #5012: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:04 EST 2012
ssl.sh: #5013: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:04 EST 2012
ssl.sh: #5014: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:04 EST 2012
ssl.sh: #5015: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:04 EST 2012
ssl.sh: #5016: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:04 EST 2012
ssl.sh: #5017: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:04 EST 2012
ssl.sh: #5018: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:05 EST 2012
ssl.sh: #5019: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:05 EST 2012
ssl.sh: #5020: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:05 EST 2012
ssl.sh: #5021: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:05 EST 2012
ssl.sh: #5022: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:05 EST 2012
================= CRL Reloaded =============
ssl.sh: #5023: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:05 EST 2012
ssl.sh: #5024: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:05 EST 2012
ssl.sh: #5025: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:05 EST 2012
ssl.sh: #5026: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:05 EST 2012
ssl.sh: #5027: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:05 EST 2012
ssl.sh: #5028: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:05 EST 2012
ssl.sh: #5029: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:05 EST 2012
ssl.sh: #5030: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:06 EST 2012
ssl.sh: #5031: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:06 EST 2012
ssl.sh: #5032: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:06 EST 2012
ssl.sh: #5033: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:06 EST 2012
ssl.sh: #5034: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:06 EST 2012
ssl.sh: #5035: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:06 EST 2012
ssl.sh: #5036: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:06 EST 2012
================= CRL Reloaded =============
ssl.sh: #5037: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:06 EST 2012
ssl.sh: #5038: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:06 EST 2012
ssl.sh: #5039: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:06 EST 2012
ssl.sh: #5040: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:06 EST 2012
ssl.sh: #5041: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:06 EST 2012
ssl.sh: #5042: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:07 EST 2012
ssl.sh: #5043: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:07 EST 2012
ssl.sh: #5044: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:07 EST 2012
ssl.sh: #5045: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:07 EST 2012
ssl.sh: #5046: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:07 EST 2012
ssl.sh: #5047: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:07 EST 2012
ssl.sh: #5048: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:07 EST 2012
ssl.sh: #5049: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 30010 >/dev/null 2>/dev/null
selfserv with PID 30010 found at Tue Nov 27 19:14:07 EST 2012
ssl.sh: #5050: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30010 at Tue Nov 27 19:14:07 EST 2012
kill -USR1 30010
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30010 killed at Tue Nov 27 19:14:07 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:14:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:07 EST 2012
selfserv with PID 31430 started at Tue Nov 27 19:14:07 EST 2012
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:07 EST 2012
ssl.sh: #5051: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:07 EST 2012
ssl.sh: #5052: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:08 EST 2012
ssl.sh: #5053: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:08 EST 2012
ssl.sh: #5054: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:08 EST 2012
ssl.sh: #5055: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:08 EST 2012
ssl.sh: #5056: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:08 EST 2012
ssl.sh: #5057: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:08 EST 2012
ssl.sh: #5058: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:08 EST 2012
ssl.sh: #5059: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:08 EST 2012
ssl.sh: #5060: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:08 EST 2012
ssl.sh: #5061: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:08 EST 2012
ssl.sh: #5062: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:08 EST 2012
ssl.sh: #5063: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:08 EST 2012
================= CRL Reloaded =============
ssl.sh: #5064: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:09 EST 2012
ssl.sh: #5065: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:09 EST 2012
ssl.sh: #5066: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:09 EST 2012
ssl.sh: #5067: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:09 EST 2012
ssl.sh: #5068: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:09 EST 2012
ssl.sh: #5069: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:09 EST 2012
ssl.sh: #5070: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:09 EST 2012
ssl.sh: #5071: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:09 EST 2012
ssl.sh: #5072: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:09 EST 2012
ssl.sh: #5073: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:09 EST 2012
ssl.sh: #5074: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:10 EST 2012
ssl.sh: #5075: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:10 EST 2012
ssl.sh: #5076: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:10 EST 2012
ssl.sh: #5077: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:10 EST 2012
================= CRL Reloaded =============
ssl.sh: #5078: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:10 EST 2012
ssl.sh: #5079: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:10 EST 2012
ssl.sh: #5080: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:10 EST 2012
ssl.sh: #5081: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:10 EST 2012
ssl.sh: #5082: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:10 EST 2012
ssl.sh: #5083: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:10 EST 2012
ssl.sh: #5084: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:10 EST 2012
ssl.sh: #5085: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:10 EST 2012
ssl.sh: #5086: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:11 EST 2012
ssl.sh: #5087: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:11 EST 2012
ssl.sh: #5088: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:11 EST 2012
ssl.sh: #5089: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:11 EST 2012
ssl.sh: #5090: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 31430 >/dev/null 2>/dev/null
selfserv with PID 31430 found at Tue Nov 27 19:14:11 EST 2012
ssl.sh: #5091: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31430 at Tue Nov 27 19:14:11 EST 2012
kill -USR1 31430
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31430 killed at Tue Nov 27 19:14:11 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:14:11 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:11 EST 2012
selfserv with PID 388 started at Tue Nov 27 19:14:11 EST 2012
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:11 EST 2012
ssl.sh: #5092: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:11 EST 2012
ssl.sh: #5093: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:11 EST 2012
ssl.sh: #5094: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:12 EST 2012
ssl.sh: #5095: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:12 EST 2012
ssl.sh: #5096: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:12 EST 2012
ssl.sh: #5097: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:12 EST 2012
ssl.sh: #5098: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:12 EST 2012
ssl.sh: #5099: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:12 EST 2012
ssl.sh: #5100: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:12 EST 2012
ssl.sh: #5101: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:12 EST 2012
ssl.sh: #5102: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:12 EST 2012
ssl.sh: #5103: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:13 EST 2012
ssl.sh: #5104: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:13 EST 2012
================= CRL Reloaded =============
ssl.sh: #5105: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:13 EST 2012
ssl.sh: #5106: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:13 EST 2012
ssl.sh: #5107: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:13 EST 2012
ssl.sh: #5108: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:13 EST 2012
ssl.sh: #5109: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:13 EST 2012
ssl.sh: #5110: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:13 EST 2012
ssl.sh: #5111: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:13 EST 2012
ssl.sh: #5112: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:13 EST 2012
ssl.sh: #5113: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:14 EST 2012
ssl.sh: #5114: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:14 EST 2012
ssl.sh: #5115: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:14 EST 2012
ssl.sh: #5116: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:14 EST 2012
ssl.sh: #5117: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:14 EST 2012
ssl.sh: #5118: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:14 EST 2012
================= CRL Reloaded =============
ssl.sh: #5119: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:14 EST 2012
ssl.sh: #5120: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:14 EST 2012
ssl.sh: #5121: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:14 EST 2012
ssl.sh: #5122: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:14 EST 2012
ssl.sh: #5123: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:15 EST 2012
ssl.sh: #5124: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:15 EST 2012
ssl.sh: #5125: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:15 EST 2012
ssl.sh: #5126: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:15 EST 2012
ssl.sh: #5127: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:15 EST 2012
ssl.sh: #5128: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:15 EST 2012
ssl.sh: #5129: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:15 EST 2012
ssl.sh: #5130: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:15 EST 2012
ssl.sh: #5131: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 388 >/dev/null 2>/dev/null
selfserv with PID 388 found at Tue Nov 27 19:14:16 EST 2012
ssl.sh: #5132: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 388 at Tue Nov 27 19:14:16 EST 2012
kill -USR1 388
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 388 killed at Tue Nov 27 19:14:16 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:14:16 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:16 EST 2012
selfserv with PID 1917 started at Tue Nov 27 19:14:16 EST 2012
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:16 EST 2012
ssl.sh: #5133: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:16 EST 2012
ssl.sh: #5134: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:16 EST 2012
ssl.sh: #5135: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:16 EST 2012
ssl.sh: #5136: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:16 EST 2012
ssl.sh: #5137: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:16 EST 2012
ssl.sh: #5138: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:16 EST 2012
ssl.sh: #5139: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:17 EST 2012
ssl.sh: #5140: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:17 EST 2012
ssl.sh: #5141: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:17 EST 2012
ssl.sh: #5142: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:17 EST 2012
ssl.sh: #5143: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:17 EST 2012
ssl.sh: #5144: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:17 EST 2012
ssl.sh: #5145: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:17 EST 2012
================= CRL Reloaded =============
ssl.sh: #5146: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:17 EST 2012
ssl.sh: #5147: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:17 EST 2012
ssl.sh: #5148: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:18 EST 2012
ssl.sh: #5149: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:18 EST 2012
ssl.sh: #5150: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:18 EST 2012
ssl.sh: #5151: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:18 EST 2012
ssl.sh: #5152: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:18 EST 2012
ssl.sh: #5153: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:18 EST 2012
ssl.sh: #5154: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:18 EST 2012
ssl.sh: #5155: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:18 EST 2012
ssl.sh: #5156: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:18 EST 2012
ssl.sh: #5157: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:19 EST 2012
ssl.sh: #5158: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:19 EST 2012
ssl.sh: #5159: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:19 EST 2012
================= CRL Reloaded =============
ssl.sh: #5160: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:19 EST 2012
ssl.sh: #5161: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:19 EST 2012
ssl.sh: #5162: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:19 EST 2012
ssl.sh: #5163: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:19 EST 2012
ssl.sh: #5164: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:19 EST 2012
ssl.sh: #5165: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:19 EST 2012
ssl.sh: #5166: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:19 EST 2012
ssl.sh: #5167: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:20 EST 2012
ssl.sh: #5168: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:20 EST 2012
ssl.sh: #5169: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:20 EST 2012
ssl.sh: #5170: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:20 EST 2012
ssl.sh: #5171: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:20 EST 2012
ssl.sh: #5172: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1917 >/dev/null 2>/dev/null
selfserv with PID 1917 found at Tue Nov 27 19:14:20 EST 2012
ssl.sh: #5173: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 1917 at Tue Nov 27 19:14:20 EST 2012
kill -USR1 1917
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1917 killed at Tue Nov 27 19:14:20 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:14:20 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3339 >/dev/null 2>/dev/null
selfserv with PID 3339 found at Tue Nov 27 19:14:20 EST 2012
selfserv with PID 3339 started at Tue Nov 27 19:14:20 EST 2012
trying to kill selfserv with PID 3339 at Tue Nov 27 19:14:20 EST 2012
kill -USR1 3339
./ssl.sh: line 173:  3339 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3339 killed at Tue Nov 27 19:14:20 EST 2012
selfserv starting at Tue Nov 27 19:14:20 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:20 EST 2012
selfserv with PID 3381 started at Tue Nov 27 19:14:20 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:20 EST 2012
ssl.sh: #5174: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:21 EST 2012
ssl.sh: #5175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:21 EST 2012
ssl.sh: #5176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:21 EST 2012
ssl.sh: #5177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:21 EST 2012
ssl.sh: #5178: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:21 EST 2012
ssl.sh: #5179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:21 EST 2012
ssl.sh: #5180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:21 EST 2012
ssl.sh: #5181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:21 EST 2012
ssl.sh: #5182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:21 EST 2012
ssl.sh: #5183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:21 EST 2012
ssl.sh: #5184: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:21 EST 2012
ssl.sh: #5185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:22 EST 2012
ssl.sh: #5186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:22 EST 2012
================= CRL Reloaded =============
ssl.sh: #5187: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:22 EST 2012
ssl.sh: #5188: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:22 EST 2012
ssl.sh: #5189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:22 EST 2012
ssl.sh: #5190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:22 EST 2012
ssl.sh: #5191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:22 EST 2012
ssl.sh: #5192: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:22 EST 2012
ssl.sh: #5193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:22 EST 2012
ssl.sh: #5194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:22 EST 2012
ssl.sh: #5195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:22 EST 2012
ssl.sh: #5196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:22 EST 2012
ssl.sh: #5197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:23 EST 2012
ssl.sh: #5198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:23 EST 2012
ssl.sh: #5199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:23 EST 2012
ssl.sh: #5200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:23 EST 2012
================= CRL Reloaded =============
ssl.sh: #5201: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:23 EST 2012
ssl.sh: #5202: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:23 EST 2012
ssl.sh: #5203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:23 EST 2012
ssl.sh: #5204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:23 EST 2012
ssl.sh: #5205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:23 EST 2012
ssl.sh: #5206: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:23 EST 2012
ssl.sh: #5207: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:23 EST 2012
ssl.sh: #5208: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:23 EST 2012
ssl.sh: #5209: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:23 EST 2012
ssl.sh: #5210: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:23 EST 2012
ssl.sh: #5211: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:24 EST 2012
ssl.sh: #5212: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:24 EST 2012
ssl.sh: #5213: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 3381 >/dev/null 2>/dev/null
selfserv with PID 3381 found at Tue Nov 27 19:14:24 EST 2012
ssl.sh: #5214: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3381 at Tue Nov 27 19:14:24 EST 2012
kill -USR1 3381
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3381 killed at Tue Nov 27 19:14:24 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:14:24 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:24 EST 2012
selfserv with PID 4802 started at Tue Nov 27 19:14:24 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:24 EST 2012
ssl.sh: #5215: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:24 EST 2012
ssl.sh: #5216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:24 EST 2012
ssl.sh: #5217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:24 EST 2012
ssl.sh: #5218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:24 EST 2012
ssl.sh: #5219: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:24 EST 2012
ssl.sh: #5220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:24 EST 2012
ssl.sh: #5221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:25 EST 2012
ssl.sh: #5222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:25 EST 2012
ssl.sh: #5223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:25 EST 2012
ssl.sh: #5224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:25 EST 2012
ssl.sh: #5225: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:25 EST 2012
ssl.sh: #5226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:25 EST 2012
ssl.sh: #5227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:25 EST 2012
================= CRL Reloaded =============
ssl.sh: #5228: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:25 EST 2012
ssl.sh: #5229: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:25 EST 2012
ssl.sh: #5230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:25 EST 2012
ssl.sh: #5231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:25 EST 2012
ssl.sh: #5232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:25 EST 2012
ssl.sh: #5233: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:26 EST 2012
ssl.sh: #5234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:26 EST 2012
ssl.sh: #5235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:26 EST 2012
ssl.sh: #5236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:26 EST 2012
ssl.sh: #5237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:26 EST 2012
ssl.sh: #5238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:26 EST 2012
ssl.sh: #5239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:26 EST 2012
ssl.sh: #5240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:26 EST 2012
ssl.sh: #5241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:26 EST 2012
================= CRL Reloaded =============
ssl.sh: #5242: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:26 EST 2012
ssl.sh: #5243: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:26 EST 2012
ssl.sh: #5244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:27 EST 2012
ssl.sh: #5245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:27 EST 2012
ssl.sh: #5246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:27 EST 2012
ssl.sh: #5247: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:27 EST 2012
ssl.sh: #5248: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:27 EST 2012
ssl.sh: #5249: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:27 EST 2012
ssl.sh: #5250: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:27 EST 2012
ssl.sh: #5251: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:27 EST 2012
ssl.sh: #5252: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:27 EST 2012
ssl.sh: #5253: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:27 EST 2012
ssl.sh: #5254: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4802 >/dev/null 2>/dev/null
selfserv with PID 4802 found at Tue Nov 27 19:14:27 EST 2012
ssl.sh: #5255: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4802 at Tue Nov 27 19:14:27 EST 2012
kill -USR1 4802
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4802 killed at Tue Nov 27 19:14:27 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:14:27 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:27 EST 2012
selfserv with PID 6225 started at Tue Nov 27 19:14:27 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:28 EST 2012
ssl.sh: #5256: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:28 EST 2012
ssl.sh: #5257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:28 EST 2012
ssl.sh: #5258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:28 EST 2012
ssl.sh: #5259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:28 EST 2012
ssl.sh: #5260: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:28 EST 2012
ssl.sh: #5261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:28 EST 2012
ssl.sh: #5262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:28 EST 2012
ssl.sh: #5263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:28 EST 2012
ssl.sh: #5264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:28 EST 2012
ssl.sh: #5265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:29 EST 2012
ssl.sh: #5266: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:29 EST 2012
ssl.sh: #5267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:29 EST 2012
ssl.sh: #5268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:29 EST 2012
================= CRL Reloaded =============
ssl.sh: #5269: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:29 EST 2012
ssl.sh: #5270: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:29 EST 2012
ssl.sh: #5271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:29 EST 2012
ssl.sh: #5272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:29 EST 2012
ssl.sh: #5273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:29 EST 2012
ssl.sh: #5274: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:29 EST 2012
ssl.sh: #5275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:29 EST 2012
ssl.sh: #5276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:29 EST 2012
ssl.sh: #5277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:29 EST 2012
ssl.sh: #5278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:30 EST 2012
ssl.sh: #5279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:30 EST 2012
ssl.sh: #5280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:30 EST 2012
ssl.sh: #5281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:30 EST 2012
ssl.sh: #5282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:30 EST 2012
================= CRL Reloaded =============
ssl.sh: #5283: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:30 EST 2012
ssl.sh: #5284: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:30 EST 2012
ssl.sh: #5285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:30 EST 2012
ssl.sh: #5286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:30 EST 2012
ssl.sh: #5287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:30 EST 2012
ssl.sh: #5288: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:30 EST 2012
ssl.sh: #5289: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:30 EST 2012
ssl.sh: #5290: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:31 EST 2012
ssl.sh: #5291: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:31 EST 2012
ssl.sh: #5292: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:31 EST 2012
ssl.sh: #5293: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:31 EST 2012
ssl.sh: #5294: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:31 EST 2012
ssl.sh: #5295: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 6225 >/dev/null 2>/dev/null
selfserv with PID 6225 found at Tue Nov 27 19:14:31 EST 2012
ssl.sh: #5296: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 6225 at Tue Nov 27 19:14:31 EST 2012
kill -USR1 6225
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 6225 killed at Tue Nov 27 19:14:31 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:14:31 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:31 EST 2012
selfserv with PID 7645 started at Tue Nov 27 19:14:31 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:31 EST 2012
ssl.sh: #5297: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:31 EST 2012
ssl.sh: #5298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:31 EST 2012
ssl.sh: #5299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:32 EST 2012
ssl.sh: #5300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:32 EST 2012
ssl.sh: #5301: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:32 EST 2012
ssl.sh: #5302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:32 EST 2012
ssl.sh: #5303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:32 EST 2012
ssl.sh: #5304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:32 EST 2012
ssl.sh: #5305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:32 EST 2012
ssl.sh: #5306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:32 EST 2012
ssl.sh: #5307: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:32 EST 2012
ssl.sh: #5308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:33 EST 2012
ssl.sh: #5309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:33 EST 2012
================= CRL Reloaded =============
ssl.sh: #5310: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:33 EST 2012
ssl.sh: #5311: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:33 EST 2012
ssl.sh: #5312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:33 EST 2012
ssl.sh: #5313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:33 EST 2012
ssl.sh: #5314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:33 EST 2012
ssl.sh: #5315: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:33 EST 2012
ssl.sh: #5316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:33 EST 2012
ssl.sh: #5317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:34 EST 2012
ssl.sh: #5318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:34 EST 2012
ssl.sh: #5319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:34 EST 2012
ssl.sh: #5320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:34 EST 2012
ssl.sh: #5321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:34 EST 2012
ssl.sh: #5322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:34 EST 2012
ssl.sh: #5323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:34 EST 2012
================= CRL Reloaded =============
ssl.sh: #5324: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:34 EST 2012
ssl.sh: #5325: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:34 EST 2012
ssl.sh: #5326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:35 EST 2012
ssl.sh: #5327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:35 EST 2012
ssl.sh: #5328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:35 EST 2012
ssl.sh: #5329: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:35 EST 2012
ssl.sh: #5330: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:35 EST 2012
ssl.sh: #5331: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:35 EST 2012
ssl.sh: #5332: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:35 EST 2012
ssl.sh: #5333: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:35 EST 2012
ssl.sh: #5334: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:35 EST 2012
ssl.sh: #5335: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:35 EST 2012
ssl.sh: #5336: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7645 >/dev/null 2>/dev/null
selfserv with PID 7645 found at Tue Nov 27 19:14:36 EST 2012
ssl.sh: #5337: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 7645 at Tue Nov 27 19:14:36 EST 2012
kill -USR1 7645
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 7645 killed at Tue Nov 27 19:14:36 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:14:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:36 EST 2012
selfserv with PID 9065 started at Tue Nov 27 19:14:36 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:36 EST 2012
ssl.sh: #5338: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:36 EST 2012
ssl.sh: #5339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:36 EST 2012
ssl.sh: #5340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:36 EST 2012
ssl.sh: #5341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:36 EST 2012
ssl.sh: #5342: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:36 EST 2012
ssl.sh: #5343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:37 EST 2012
ssl.sh: #5344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:37 EST 2012
ssl.sh: #5345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:37 EST 2012
ssl.sh: #5346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:37 EST 2012
ssl.sh: #5347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:37 EST 2012
ssl.sh: #5348: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:37 EST 2012
ssl.sh: #5349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:37 EST 2012
ssl.sh: #5350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:37 EST 2012
================= CRL Reloaded =============
ssl.sh: #5351: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:37 EST 2012
ssl.sh: #5352: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:37 EST 2012
ssl.sh: #5353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:38 EST 2012
ssl.sh: #5354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:38 EST 2012
ssl.sh: #5355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:38 EST 2012
ssl.sh: #5356: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:38 EST 2012
ssl.sh: #5357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:38 EST 2012
ssl.sh: #5358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:38 EST 2012
ssl.sh: #5359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:38 EST 2012
ssl.sh: #5360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:38 EST 2012
ssl.sh: #5361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:38 EST 2012
ssl.sh: #5362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:38 EST 2012
ssl.sh: #5363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:39 EST 2012
ssl.sh: #5364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:39 EST 2012
================= CRL Reloaded =============
ssl.sh: #5365: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:39 EST 2012
ssl.sh: #5366: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:39 EST 2012
ssl.sh: #5367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:39 EST 2012
ssl.sh: #5368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:39 EST 2012
ssl.sh: #5369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:39 EST 2012
ssl.sh: #5370: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:39 EST 2012
ssl.sh: #5371: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:39 EST 2012
ssl.sh: #5372: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:39 EST 2012
ssl.sh: #5373: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:39 EST 2012
ssl.sh: #5374: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:39 EST 2012
ssl.sh: #5375: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:40 EST 2012
ssl.sh: #5376: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:40 EST 2012
ssl.sh: #5377: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 9065 >/dev/null 2>/dev/null
selfserv with PID 9065 found at Tue Nov 27 19:14:40 EST 2012
ssl.sh: #5378: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9065 at Tue Nov 27 19:14:40 EST 2012
kill -USR1 9065
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9065 killed at Tue Nov 27 19:14:40 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:14:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:40 EST 2012
selfserv with PID 10485 started at Tue Nov 27 19:14:40 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:40 EST 2012
ssl.sh: #5379: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:40 EST 2012
ssl.sh: #5380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:40 EST 2012
ssl.sh: #5381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:40 EST 2012
ssl.sh: #5382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:40 EST 2012
ssl.sh: #5383: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:40 EST 2012
ssl.sh: #5384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:41 EST 2012
ssl.sh: #5385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:41 EST 2012
ssl.sh: #5386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:41 EST 2012
ssl.sh: #5387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:41 EST 2012
ssl.sh: #5388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:41 EST 2012
ssl.sh: #5389: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:41 EST 2012
ssl.sh: #5390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:41 EST 2012
ssl.sh: #5391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:41 EST 2012
================= CRL Reloaded =============
ssl.sh: #5392: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:42 EST 2012
ssl.sh: #5393: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:42 EST 2012
ssl.sh: #5394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:42 EST 2012
ssl.sh: #5395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:42 EST 2012
ssl.sh: #5396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:42 EST 2012
ssl.sh: #5397: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:42 EST 2012
ssl.sh: #5398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:42 EST 2012
ssl.sh: #5399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:42 EST 2012
ssl.sh: #5400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:42 EST 2012
ssl.sh: #5401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:42 EST 2012
ssl.sh: #5402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:43 EST 2012
ssl.sh: #5403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:43 EST 2012
ssl.sh: #5404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:43 EST 2012
ssl.sh: #5405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:43 EST 2012
================= CRL Reloaded =============
ssl.sh: #5406: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:43 EST 2012
ssl.sh: #5407: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:43 EST 2012
ssl.sh: #5408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:43 EST 2012
ssl.sh: #5409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:43 EST 2012
ssl.sh: #5410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:43 EST 2012
ssl.sh: #5411: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:43 EST 2012
ssl.sh: #5412: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:44 EST 2012
ssl.sh: #5413: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:44 EST 2012
ssl.sh: #5414: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:44 EST 2012
ssl.sh: #5415: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:44 EST 2012
ssl.sh: #5416: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:44 EST 2012
ssl.sh: #5417: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:44 EST 2012
ssl.sh: #5418: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10485 >/dev/null 2>/dev/null
selfserv with PID 10485 found at Tue Nov 27 19:14:44 EST 2012
ssl.sh: #5419: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10485 at Tue Nov 27 19:14:44 EST 2012
kill -USR1 10485
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10485 killed at Tue Nov 27 19:14:44 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:14:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11912 >/dev/null 2>/dev/null
selfserv with PID 11912 found at Tue Nov 27 19:14:44 EST 2012
selfserv with PID 11912 started at Tue Nov 27 19:14:44 EST 2012
trying to kill selfserv with PID 11912 at Tue Nov 27 19:14:44 EST 2012
kill -USR1 11912
./ssl.sh: line 173: 11912 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11912 killed at Tue Nov 27 19:14:44 EST 2012
selfserv starting at Tue Nov 27 19:14:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:44 EST 2012
selfserv with PID 11954 started at Tue Nov 27 19:14:44 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:44 EST 2012
ssl.sh: #5420: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:44 EST 2012
ssl.sh: #5421: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:45 EST 2012
ssl.sh: #5422: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:45 EST 2012
ssl.sh: #5423: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:45 EST 2012
ssl.sh: #5424: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:45 EST 2012
ssl.sh: #5425: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:45 EST 2012
ssl.sh: #5426: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:45 EST 2012
ssl.sh: #5427: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:45 EST 2012
ssl.sh: #5428: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:45 EST 2012
ssl.sh: #5429: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:45 EST 2012
ssl.sh: #5430: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:45 EST 2012
ssl.sh: #5431: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:45 EST 2012
ssl.sh: #5432: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:45 EST 2012
================= CRL Reloaded =============
ssl.sh: #5433: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:46 EST 2012
ssl.sh: #5434: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:46 EST 2012
ssl.sh: #5435: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:46 EST 2012
ssl.sh: #5436: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:46 EST 2012
ssl.sh: #5437: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:46 EST 2012
ssl.sh: #5438: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:46 EST 2012
ssl.sh: #5439: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:46 EST 2012
ssl.sh: #5440: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:46 EST 2012
ssl.sh: #5441: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:46 EST 2012
ssl.sh: #5442: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:46 EST 2012
ssl.sh: #5443: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:46 EST 2012
ssl.sh: #5444: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:46 EST 2012
ssl.sh: #5445: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:47 EST 2012
ssl.sh: #5446: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:47 EST 2012
================= CRL Reloaded =============
ssl.sh: #5447: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:47 EST 2012
ssl.sh: #5448: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:47 EST 2012
ssl.sh: #5449: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:47 EST 2012
ssl.sh: #5450: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:47 EST 2012
ssl.sh: #5451: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:47 EST 2012
ssl.sh: #5452: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:47 EST 2012
ssl.sh: #5453: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:47 EST 2012
ssl.sh: #5454: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:47 EST 2012
ssl.sh: #5455: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:47 EST 2012
ssl.sh: #5456: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:47 EST 2012
ssl.sh: #5457: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:48 EST 2012
ssl.sh: #5458: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:48 EST 2012
ssl.sh: #5459: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11954 >/dev/null 2>/dev/null
selfserv with PID 11954 found at Tue Nov 27 19:14:48 EST 2012
ssl.sh: #5460: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11954 at Tue Nov 27 19:14:48 EST 2012
kill -USR1 11954
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11954 killed at Tue Nov 27 19:14:48 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:14:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:48 EST 2012
selfserv with PID 13378 started at Tue Nov 27 19:14:48 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:48 EST 2012
ssl.sh: #5461: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:48 EST 2012
ssl.sh: #5462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:48 EST 2012
ssl.sh: #5463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:48 EST 2012
ssl.sh: #5464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:48 EST 2012
ssl.sh: #5465: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:48 EST 2012
ssl.sh: #5466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:48 EST 2012
ssl.sh: #5467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:48 EST 2012
ssl.sh: #5468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:49 EST 2012
ssl.sh: #5469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:49 EST 2012
ssl.sh: #5470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:49 EST 2012
ssl.sh: #5471: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:49 EST 2012
ssl.sh: #5472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:49 EST 2012
ssl.sh: #5473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:49 EST 2012
================= CRL Reloaded =============
ssl.sh: #5474: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:49 EST 2012
ssl.sh: #5475: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:49 EST 2012
ssl.sh: #5476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:49 EST 2012
ssl.sh: #5477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:49 EST 2012
ssl.sh: #5478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:49 EST 2012
ssl.sh: #5479: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:49 EST 2012
ssl.sh: #5480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:49 EST 2012
ssl.sh: #5481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:50 EST 2012
ssl.sh: #5482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:50 EST 2012
ssl.sh: #5483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:50 EST 2012
ssl.sh: #5484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:50 EST 2012
ssl.sh: #5485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:50 EST 2012
ssl.sh: #5486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:50 EST 2012
ssl.sh: #5487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:50 EST 2012
================= CRL Reloaded =============
ssl.sh: #5488: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:50 EST 2012
ssl.sh: #5489: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:50 EST 2012
ssl.sh: #5490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:50 EST 2012
ssl.sh: #5491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:50 EST 2012
ssl.sh: #5492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:50 EST 2012
ssl.sh: #5493: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:50 EST 2012
ssl.sh: #5494: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:50 EST 2012
ssl.sh: #5495: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:51 EST 2012
ssl.sh: #5496: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:51 EST 2012
ssl.sh: #5497: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:51 EST 2012
ssl.sh: #5498: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:51 EST 2012
ssl.sh: #5499: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:51 EST 2012
ssl.sh: #5500: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13378 >/dev/null 2>/dev/null
selfserv with PID 13378 found at Tue Nov 27 19:14:51 EST 2012
ssl.sh: #5501: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13378 at Tue Nov 27 19:14:51 EST 2012
kill -USR1 13378
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13378 killed at Tue Nov 27 19:14:51 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:14:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:51 EST 2012
selfserv with PID 14799 started at Tue Nov 27 19:14:51 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:51 EST 2012
ssl.sh: #5502: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:51 EST 2012
ssl.sh: #5503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:51 EST 2012
ssl.sh: #5504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:51 EST 2012
ssl.sh: #5505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:51 EST 2012
ssl.sh: #5506: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:51 EST 2012
ssl.sh: #5507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:52 EST 2012
ssl.sh: #5508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:52 EST 2012
ssl.sh: #5509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:52 EST 2012
ssl.sh: #5510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:52 EST 2012
ssl.sh: #5511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:52 EST 2012
ssl.sh: #5512: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:52 EST 2012
ssl.sh: #5513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:52 EST 2012
ssl.sh: #5514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:52 EST 2012
================= CRL Reloaded =============
ssl.sh: #5515: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:52 EST 2012
ssl.sh: #5516: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:52 EST 2012
ssl.sh: #5517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:52 EST 2012
ssl.sh: #5518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:52 EST 2012
ssl.sh: #5519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:52 EST 2012
ssl.sh: #5520: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:52 EST 2012
ssl.sh: #5521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:53 EST 2012
ssl.sh: #5522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:53 EST 2012
ssl.sh: #5523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:53 EST 2012
ssl.sh: #5524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:53 EST 2012
ssl.sh: #5525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:53 EST 2012
ssl.sh: #5526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:53 EST 2012
ssl.sh: #5527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:53 EST 2012
ssl.sh: #5528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 156 bytes
tstclnt: Writing 156 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:53 EST 2012
================= CRL Reloaded =============
ssl.sh: #5529: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:53 EST 2012
ssl.sh: #5530: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:53 EST 2012
ssl.sh: #5531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:53 EST 2012
ssl.sh: #5532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:53 EST 2012
ssl.sh: #5533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:53 EST 2012
ssl.sh: #5534: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:53 EST 2012
ssl.sh: #5535: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:54 EST 2012
ssl.sh: #5536: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:54 EST 2012
ssl.sh: #5537: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:54 EST 2012
ssl.sh: #5538: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:54 EST 2012
ssl.sh: #5539: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:54 EST 2012
ssl.sh: #5540: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:54 EST 2012
ssl.sh: #5541: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Tue Nov 27 19:14:54 EST 2012
ssl.sh: #5542: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14799 at Tue Nov 27 19:14:54 EST 2012
kill -USR1 14799
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14799 killed at Tue Nov 27 19:14:54 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:14:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:54 EST 2012
selfserv with PID 16219 started at Tue Nov 27 19:14:54 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:54 EST 2012
ssl.sh: #5543: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:54 EST 2012
ssl.sh: #5544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:55 EST 2012
ssl.sh: #5545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:55 EST 2012
ssl.sh: #5546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:55 EST 2012
ssl.sh: #5547: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:55 EST 2012
ssl.sh: #5548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:55 EST 2012
ssl.sh: #5549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:55 EST 2012
ssl.sh: #5550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:55 EST 2012
ssl.sh: #5551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:55 EST 2012
ssl.sh: #5552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:55 EST 2012
ssl.sh: #5553: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:55 EST 2012
ssl.sh: #5554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:56 EST 2012
ssl.sh: #5555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:56 EST 2012
================= CRL Reloaded =============
ssl.sh: #5556: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:56 EST 2012
ssl.sh: #5557: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:56 EST 2012
ssl.sh: #5558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:56 EST 2012
ssl.sh: #5559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:56 EST 2012
ssl.sh: #5560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:56 EST 2012
ssl.sh: #5561: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:56 EST 2012
ssl.sh: #5562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:56 EST 2012
ssl.sh: #5563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:57 EST 2012
ssl.sh: #5564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:57 EST 2012
ssl.sh: #5565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:57 EST 2012
ssl.sh: #5566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:57 EST 2012
ssl.sh: #5567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:57 EST 2012
ssl.sh: #5568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:57 EST 2012
ssl.sh: #5569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:57 EST 2012
================= CRL Reloaded =============
ssl.sh: #5570: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:57 EST 2012
ssl.sh: #5571: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:57 EST 2012
ssl.sh: #5572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:57 EST 2012
ssl.sh: #5573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:57 EST 2012
ssl.sh: #5574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:58 EST 2012
ssl.sh: #5575: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:58 EST 2012
ssl.sh: #5576: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:58 EST 2012
ssl.sh: #5577: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:58 EST 2012
ssl.sh: #5578: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:58 EST 2012
ssl.sh: #5579: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:58 EST 2012
ssl.sh: #5580: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:58 EST 2012
ssl.sh: #5581: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:58 EST 2012
ssl.sh: #5582: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16219 >/dev/null 2>/dev/null
selfserv with PID 16219 found at Tue Nov 27 19:14:58 EST 2012
ssl.sh: #5583: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16219 at Tue Nov 27 19:14:58 EST 2012
kill -USR1 16219
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16219 killed at Tue Nov 27 19:14:58 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:14:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:14:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:14:58 EST 2012
selfserv with PID 17640 started at Tue Nov 27 19:14:58 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:14:59 EST 2012
ssl.sh: #5584: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:14:59 EST 2012
ssl.sh: #5585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:14:59 EST 2012
ssl.sh: #5586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:14:59 EST 2012
ssl.sh: #5587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:14:59 EST 2012
ssl.sh: #5588: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:14:59 EST 2012
ssl.sh: #5589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:14:59 EST 2012
ssl.sh: #5590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:14:59 EST 2012
ssl.sh: #5591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:00 EST 2012
ssl.sh: #5592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:00 EST 2012
ssl.sh: #5593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:00 EST 2012
ssl.sh: #5594: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:00 EST 2012
ssl.sh: #5595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:00 EST 2012
ssl.sh: #5596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:00 EST 2012
================= CRL Reloaded =============
ssl.sh: #5597: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:00 EST 2012
ssl.sh: #5598: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:00 EST 2012
ssl.sh: #5599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:01 EST 2012
ssl.sh: #5600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:01 EST 2012
ssl.sh: #5601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:01 EST 2012
ssl.sh: #5602: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:01 EST 2012
ssl.sh: #5603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:01 EST 2012
ssl.sh: #5604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:01 EST 2012
ssl.sh: #5605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:01 EST 2012
ssl.sh: #5606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:01 EST 2012
ssl.sh: #5607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:01 EST 2012
ssl.sh: #5608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:02 EST 2012
ssl.sh: #5609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:02 EST 2012
ssl.sh: #5610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:02 EST 2012
================= CRL Reloaded =============
ssl.sh: #5611: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:02 EST 2012
ssl.sh: #5612: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:02 EST 2012
ssl.sh: #5613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:02 EST 2012
ssl.sh: #5614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:02 EST 2012
ssl.sh: #5615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:02 EST 2012
ssl.sh: #5616: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:02 EST 2012
ssl.sh: #5617: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:02 EST 2012
ssl.sh: #5618: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:03 EST 2012
ssl.sh: #5619: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:03 EST 2012
ssl.sh: #5620: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:03 EST 2012
ssl.sh: #5621: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:03 EST 2012
ssl.sh: #5622: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:03 EST 2012
ssl.sh: #5623: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17640 >/dev/null 2>/dev/null
selfserv with PID 17640 found at Tue Nov 27 19:15:03 EST 2012
ssl.sh: #5624: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17640 at Tue Nov 27 19:15:03 EST 2012
kill -USR1 17640
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17640 killed at Tue Nov 27 19:15:03 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:15:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:03 EST 2012
selfserv with PID 19061 started at Tue Nov 27 19:15:03 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:03 EST 2012
ssl.sh: #5625: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:04 EST 2012
ssl.sh: #5626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:04 EST 2012
ssl.sh: #5627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:04 EST 2012
ssl.sh: #5628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:04 EST 2012
ssl.sh: #5629: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:04 EST 2012
ssl.sh: #5630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:04 EST 2012
ssl.sh: #5631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:04 EST 2012
ssl.sh: #5632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:04 EST 2012
ssl.sh: #5633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:04 EST 2012
ssl.sh: #5634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:04 EST 2012
ssl.sh: #5635: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:05 EST 2012
ssl.sh: #5636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:05 EST 2012
ssl.sh: #5637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_43-48-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:05 EST 2012
================= CRL Reloaded =============
ssl.sh: #5638: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:05 EST 2012
ssl.sh: #5639: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:05 EST 2012
ssl.sh: #5640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:05 EST 2012
ssl.sh: #5641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:05 EST 2012
ssl.sh: #5642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:05 EST 2012
ssl.sh: #5643: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:06 EST 2012
ssl.sh: #5644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:06 EST 2012
ssl.sh: #5645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:06 EST 2012
ssl.sh: #5646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:06 EST 2012
ssl.sh: #5647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:06 EST 2012
ssl.sh: #5648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:06 EST 2012
ssl.sh: #5649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:06 EST 2012
ssl.sh: #5650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:06 EST 2012
ssl.sh: #5651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/server/root.crl_49-52-ec

RELOAD time 
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:06 EST 2012
================= CRL Reloaded =============
ssl.sh: #5652: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:07 EST 2012
ssl.sh: #5653: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:07 EST 2012
ssl.sh: #5654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:07 EST 2012
ssl.sh: #5655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:07 EST 2012
ssl.sh: #5656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:07 EST 2012
ssl.sh: #5657: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:07 EST 2012
ssl.sh: #5658: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:07 EST 2012
ssl.sh: #5659: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:07 EST 2012
ssl.sh: #5660: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:07 EST 2012
ssl.sh: #5661: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:08 EST 2012
ssl.sh: #5662: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:08 EST 2012
ssl.sh: #5663: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:08 EST 2012
ssl.sh: #5664: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19061 >/dev/null 2>/dev/null
selfserv with PID 19061 found at Tue Nov 27 19:15:08 EST 2012
ssl.sh: #5665: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19061 at Tue Nov 27 19:15:08 EST 2012
kill -USR1 19061
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19061 killed at Tue Nov 27 19:15:08 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:15:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20483 >/dev/null 2>/dev/null
selfserv with PID 20483 found at Tue Nov 27 19:15:08 EST 2012
selfserv with PID 20483 started at Tue Nov 27 19:15:08 EST 2012
trying to kill selfserv with PID 20483 at Tue Nov 27 19:15:08 EST 2012
kill -USR1 20483
./ssl.sh: line 173: 20483 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20483 killed at Tue Nov 27 19:15:08 EST 2012
ssl.sh: SSL Cipher Coverage  - server bypass/client bypass  - with ECC ===============================
selfserv starting at Tue Nov 27 19:15:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:08 EST 2012
selfserv with PID 20531 started at Tue Nov 27 19:15:08 EST 2012
ssl.sh: running SSL2_RC4_128_WITH_MD5 ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c A -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5666: SSL2_RC4_128_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c B -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5667: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c C -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5668: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c D -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5669: SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c E -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5670: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_192_EDE3_CBC_WITH_MD5 ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c F -V ssl2:ssl3 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 112-bit 3DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5671: SSL2_DES_192_EDE3_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC4_128_EXPORT40_WITH_MD5 ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c B -V ssl2:tls1.1 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5672: SSL2_RC4_128_EXPORT40_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_RC2_128_CBC_WITH_MD5 ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c C -V ssl2:tls1.1 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 0.2 using 128-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5673: SSL2_RC2_128_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL2_DES_64_CBC_WITH_MD5 ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c E -V ssl2:tls1.1 -O -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: SSL version 0.2 using 56-bit DES with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: N/A
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 0 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5674: SSL2_DES_64_CBC_WITH_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5675: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5676: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5677: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5678: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5679: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5680: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5681: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5682: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5683: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5684: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5685: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5686: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5687: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5688: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5689: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5690: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5691: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5692: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5693: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5694: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5695: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5696: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5697: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5698: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5699: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5700: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5701: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5702: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5703: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5704: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5705: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5706: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5707: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5708: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5709: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5710: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5711: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5712: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5713: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5714: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5715: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5716: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5717: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5718: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5719: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5720: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5721: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5722: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5723: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20531 >/dev/null 2>/dev/null
selfserv with PID 20531 found at Tue Nov 27 19:15:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5724: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 20531 at Tue Nov 27 19:15:12 EST 2012
kill -USR1 20531
selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20531 killed at Tue Nov 27 19:15:12 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:15:12 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22121 >/dev/null 2>/dev/null
selfserv with PID 22121 found at Tue Nov 27 19:15:12 EST 2012
selfserv with PID 22121 started at Tue Nov 27 19:15:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5725: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22121 >/dev/null 2>/dev/null
selfserv with PID 22121 found at Tue Nov 27 19:15:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5726: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22121 >/dev/null 2>/dev/null
selfserv with PID 22121 found at Tue Nov 27 19:15:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5727: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22121 >/dev/null 2>/dev/null
selfserv with PID 22121 found at Tue Nov 27 19:15:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5728: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22121 >/dev/null 2>/dev/null
selfserv with PID 22121 found at Tue Nov 27 19:15:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5729: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 22121 at Tue Nov 27 19:15:13 EST 2012
kill -USR1 22121
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22121 killed at Tue Nov 27 19:15:13 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:15:13 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22270 >/dev/null 2>/dev/null
selfserv with PID 22270 found at Tue Nov 27 19:15:13 EST 2012
selfserv with PID 22270 started at Tue Nov 27 19:15:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5730: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22270 >/dev/null 2>/dev/null
selfserv with PID 22270 found at Tue Nov 27 19:15:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5731: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22270 >/dev/null 2>/dev/null
selfserv with PID 22270 found at Tue Nov 27 19:15:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5732: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22270 >/dev/null 2>/dev/null
selfserv with PID 22270 found at Tue Nov 27 19:15:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5733: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22270 >/dev/null 2>/dev/null
selfserv with PID 22270 found at Tue Nov 27 19:15:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5734: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 22270 >/dev/null 2>/dev/null
selfserv with PID 22270 found at Tue Nov 27 19:15:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5735: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 22270 >/dev/null 2>/dev/null
selfserv with PID 22270 found at Tue Nov 27 19:15:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5736: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22270 >/dev/null 2>/dev/null
selfserv with PID 22270 found at Tue Nov 27 19:15:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5737: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22270 >/dev/null 2>/dev/null
selfserv with PID 22270 found at Tue Nov 27 19:15:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5738: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22270 >/dev/null 2>/dev/null
selfserv with PID 22270 found at Tue Nov 27 19:15:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5739: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 22270 >/dev/null 2>/dev/null
selfserv with PID 22270 found at Tue Nov 27 19:15:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5740: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 22270 >/dev/null 2>/dev/null
selfserv with PID 22270 found at Tue Nov 27 19:15:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5741: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22270 >/dev/null 2>/dev/null
selfserv with PID 22270 found at Tue Nov 27 19:15:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5742: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22270 >/dev/null 2>/dev/null
selfserv with PID 22270 found at Tue Nov 27 19:15:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5743: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22270 >/dev/null 2>/dev/null
selfserv with PID 22270 found at Tue Nov 27 19:15:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5744: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 22270 at Tue Nov 27 19:15:14 EST 2012
kill -USR1 22270
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22270 killed at Tue Nov 27 19:15:14 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:15:14 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22669 >/dev/null 2>/dev/null
selfserv with PID 22669 found at Tue Nov 27 19:15:14 EST 2012
selfserv with PID 22669 started at Tue Nov 27 19:15:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5745: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22669 >/dev/null 2>/dev/null
selfserv with PID 22669 found at Tue Nov 27 19:15:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5746: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22669 >/dev/null 2>/dev/null
selfserv with PID 22669 found at Tue Nov 27 19:15:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5747: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22669 >/dev/null 2>/dev/null
selfserv with PID 22669 found at Tue Nov 27 19:15:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5748: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22669 >/dev/null 2>/dev/null
selfserv with PID 22669 found at Tue Nov 27 19:15:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5749: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 22669 at Tue Nov 27 19:15:15 EST 2012
kill -USR1 22669
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22669 killed at Tue Nov 27 19:15:15 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:15:15 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22817 >/dev/null 2>/dev/null
selfserv with PID 22817 found at Tue Nov 27 19:15:15 EST 2012
selfserv with PID 22817 started at Tue Nov 27 19:15:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5750: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 22817 >/dev/null 2>/dev/null
selfserv with PID 22817 found at Tue Nov 27 19:15:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5751: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22817 >/dev/null 2>/dev/null
selfserv with PID 22817 found at Tue Nov 27 19:15:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5752: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22817 >/dev/null 2>/dev/null
selfserv with PID 22817 found at Tue Nov 27 19:15:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5753: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22817 >/dev/null 2>/dev/null
selfserv with PID 22817 found at Tue Nov 27 19:15:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5754: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 22817 >/dev/null 2>/dev/null
selfserv with PID 22817 found at Tue Nov 27 19:15:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5755: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 22817 >/dev/null 2>/dev/null
selfserv with PID 22817 found at Tue Nov 27 19:15:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5756: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22817 >/dev/null 2>/dev/null
selfserv with PID 22817 found at Tue Nov 27 19:15:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5757: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22817 >/dev/null 2>/dev/null
selfserv with PID 22817 found at Tue Nov 27 19:15:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5758: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22817 >/dev/null 2>/dev/null
selfserv with PID 22817 found at Tue Nov 27 19:15:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5759: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 22817 >/dev/null 2>/dev/null
selfserv with PID 22817 found at Tue Nov 27 19:15:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5760: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 22817 >/dev/null 2>/dev/null
selfserv with PID 22817 found at Tue Nov 27 19:15:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5761: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 22817 >/dev/null 2>/dev/null
selfserv with PID 22817 found at Tue Nov 27 19:15:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5762: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 22817 >/dev/null 2>/dev/null
selfserv with PID 22817 found at Tue Nov 27 19:15:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5763: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 22817 >/dev/null 2>/dev/null
selfserv with PID 22817 found at Tue Nov 27 19:15:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5764: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 22817 at Tue Nov 27 19:15:16 EST 2012
kill -USR1 22817
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22817 killed at Tue Nov 27 19:15:16 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:15:16 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23202 >/dev/null 2>/dev/null
selfserv with PID 23202 found at Tue Nov 27 19:15:16 EST 2012
selfserv with PID 23202 started at Tue Nov 27 19:15:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5765: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23202 >/dev/null 2>/dev/null
selfserv with PID 23202 found at Tue Nov 27 19:15:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5766: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23202 >/dev/null 2>/dev/null
selfserv with PID 23202 found at Tue Nov 27 19:15:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5767: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23202 >/dev/null 2>/dev/null
selfserv with PID 23202 found at Tue Nov 27 19:15:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5768: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23202 >/dev/null 2>/dev/null
selfserv with PID 23202 found at Tue Nov 27 19:15:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 384-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5769: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 23202 at Tue Nov 27 19:15:17 EST 2012
kill -USR1 23202
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23202 killed at Tue Nov 27 19:15:17 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:15:17 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23350 >/dev/null 2>/dev/null
selfserv with PID 23350 found at Tue Nov 27 19:15:17 EST 2012
selfserv with PID 23350 started at Tue Nov 27 19:15:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5770: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 23350 >/dev/null 2>/dev/null
selfserv with PID 23350 found at Tue Nov 27 19:15:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5771: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 23350 >/dev/null 2>/dev/null
selfserv with PID 23350 found at Tue Nov 27 19:15:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5772: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 23350 >/dev/null 2>/dev/null
selfserv with PID 23350 found at Tue Nov 27 19:15:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5773: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 23350 >/dev/null 2>/dev/null
selfserv with PID 23350 found at Tue Nov 27 19:15:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1  -B -s \
        -f -d ../client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5774: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23350 at Tue Nov 27 19:15:17 EST 2012
kill -USR1 23350
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23350 killed at Tue Nov 27 19:15:17 EST 2012
ssl.sh: SSL Client Authentication  - server bypass/client bypass  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:15:17 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23549 >/dev/null 2>/dev/null
selfserv with PID 23549 found at Tue Nov 27 19:15:17 EST 2012
selfserv with PID 23549 started at Tue Nov 27 19:15:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5775: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23549 at Tue Nov 27 19:15:17 EST 2012
kill -USR1 23549
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23549 killed at Tue Nov 27 19:15:17 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:15:18 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23606 >/dev/null 2>/dev/null
selfserv with PID 23606 found at Tue Nov 27 19:15:18 EST 2012
selfserv with PID 23606 started at Tue Nov 27 19:15:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5776: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23606 at Tue Nov 27 19:15:18 EST 2012
kill -USR1 23606
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23606 killed at Tue Nov 27 19:15:18 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:15:18 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23663 >/dev/null 2>/dev/null
selfserv with PID 23663 found at Tue Nov 27 19:15:18 EST 2012
selfserv with PID 23663 started at Tue Nov 27 19:15:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5777: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23663 at Tue Nov 27 19:15:18 EST 2012
kill -USR1 23663
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23663 killed at Tue Nov 27 19:15:18 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:15:18 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23720 >/dev/null 2>/dev/null
selfserv with PID 23720 found at Tue Nov 27 19:15:18 EST 2012
selfserv with PID 23720 started at Tue Nov 27 19:15:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5778: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23720 at Tue Nov 27 19:15:18 EST 2012
kill -USR1 23720
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23720 killed at Tue Nov 27 19:15:18 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:15:18 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23777 >/dev/null 2>/dev/null
selfserv with PID 23777 found at Tue Nov 27 19:15:18 EST 2012
selfserv with PID 23777 started at Tue Nov 27 19:15:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5779: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23777 at Tue Nov 27 19:15:18 EST 2012
kill -USR1 23777
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23777 killed at Tue Nov 27 19:15:18 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:15:18 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23834 >/dev/null 2>/dev/null
selfserv with PID 23834 found at Tue Nov 27 19:15:18 EST 2012
selfserv with PID 23834 started at Tue Nov 27 19:15:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w nss -n TestUser   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5780: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23834 at Tue Nov 27 19:15:18 EST 2012
kill -USR1 23834
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23834 killed at Tue Nov 27 19:15:18 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:15:19 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23891 >/dev/null 2>/dev/null
selfserv with PID 23891 found at Tue Nov 27 19:15:19 EST 2012
selfserv with PID 23891 started at Tue Nov 27 19:15:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5781: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23891 at Tue Nov 27 19:15:19 EST 2012
kill -USR1 23891
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23891 killed at Tue Nov 27 19:15:19 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:15:19 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23948 >/dev/null 2>/dev/null
selfserv with PID 23948 found at Tue Nov 27 19:15:19 EST 2012
selfserv with PID 23948 started at Tue Nov 27 19:15:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5782: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23948 at Tue Nov 27 19:15:19 EST 2012
kill -USR1 23948
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23948 killed at Tue Nov 27 19:15:19 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:15:19 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24005 >/dev/null 2>/dev/null
selfserv with PID 24005 found at Tue Nov 27 19:15:19 EST 2012
selfserv with PID 24005 started at Tue Nov 27 19:15:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5783: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24005 at Tue Nov 27 19:15:19 EST 2012
kill -USR1 24005
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24005 killed at Tue Nov 27 19:15:19 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:15:19 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24062 >/dev/null 2>/dev/null
selfserv with PID 24062 found at Tue Nov 27 19:15:19 EST 2012
selfserv with PID 24062 started at Tue Nov 27 19:15:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5784: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24062 at Tue Nov 27 19:15:19 EST 2012
kill -USR1 24062
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24062 killed at Tue Nov 27 19:15:19 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:15:19 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24119 >/dev/null 2>/dev/null
selfserv with PID 24119 found at Tue Nov 27 19:15:19 EST 2012
selfserv with PID 24119 started at Tue Nov 27 19:15:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5785: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24119 at Tue Nov 27 19:15:20 EST 2012
kill -USR1 24119
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24119 killed at Tue Nov 27 19:15:20 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:15:20 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24176 >/dev/null 2>/dev/null
selfserv with PID 24176 found at Tue Nov 27 19:15:20 EST 2012
selfserv with PID 24176 started at Tue Nov 27 19:15:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5786: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24176 at Tue Nov 27 19:15:20 EST 2012
kill -USR1 24176
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24176 killed at Tue Nov 27 19:15:20 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:15:20 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24233 >/dev/null 2>/dev/null
selfserv with PID 24233 found at Tue Nov 27 19:15:20 EST 2012
selfserv with PID 24233 started at Tue Nov 27 19:15:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5787: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24233 at Tue Nov 27 19:15:20 EST 2012
kill -USR1 24233
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24233 killed at Tue Nov 27 19:15:20 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:15:20 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24290 >/dev/null 2>/dev/null
selfserv with PID 24290 found at Tue Nov 27 19:15:20 EST 2012
selfserv with PID 24290 started at Tue Nov 27 19:15:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5788: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24290 at Tue Nov 27 19:15:20 EST 2012
kill -USR1 24290
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24290 killed at Tue Nov 27 19:15:20 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:15:20 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24347 >/dev/null 2>/dev/null
selfserv with PID 24347 found at Tue Nov 27 19:15:20 EST 2012
selfserv with PID 24347 started at Tue Nov 27 19:15:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5789: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24347 at Tue Nov 27 19:15:20 EST 2012
kill -USR1 24347
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24347 killed at Tue Nov 27 19:15:20 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:15:21 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24404 >/dev/null 2>/dev/null
selfserv with PID 24404 found at Tue Nov 27 19:15:21 EST 2012
selfserv with PID 24404 started at Tue Nov 27 19:15:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5790: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24404 at Tue Nov 27 19:15:21 EST 2012
kill -USR1 24404
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24404 killed at Tue Nov 27 19:15:21 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:15:21 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24461 >/dev/null 2>/dev/null
selfserv with PID 24461 found at Tue Nov 27 19:15:21 EST 2012
selfserv with PID 24461 started at Tue Nov 27 19:15:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5791: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24461 at Tue Nov 27 19:15:21 EST 2012
kill -USR1 24461
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24461 killed at Tue Nov 27 19:15:21 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:15:21 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24518 >/dev/null 2>/dev/null
selfserv with PID 24518 found at Tue Nov 27 19:15:21 EST 2012
selfserv with PID 24518 started at Tue Nov 27 19:15:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5792: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24518 at Tue Nov 27 19:15:21 EST 2012
kill -USR1 24518
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24518 killed at Tue Nov 27 19:15:21 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:15:21 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24575 >/dev/null 2>/dev/null
selfserv with PID 24575 found at Tue Nov 27 19:15:21 EST 2012
selfserv with PID 24575 started at Tue Nov 27 19:15:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5793: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24575 at Tue Nov 27 19:15:21 EST 2012
kill -USR1 24575
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24575 killed at Tue Nov 27 19:15:21 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:15:21 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24632 >/dev/null 2>/dev/null
selfserv with PID 24632 found at Tue Nov 27 19:15:21 EST 2012
selfserv with PID 24632 started at Tue Nov 27 19:15:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5794: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24632 at Tue Nov 27 19:15:22 EST 2012
kill -USR1 24632
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24632 killed at Tue Nov 27 19:15:22 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:15:22 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24689 >/dev/null 2>/dev/null
selfserv with PID 24689 found at Tue Nov 27 19:15:22 EST 2012
selfserv with PID 24689 started at Tue Nov 27 19:15:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5795: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24689 at Tue Nov 27 19:15:22 EST 2012
kill -USR1 24689
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24689 killed at Tue Nov 27 19:15:22 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:15:22 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Tue Nov 27 19:15:22 EST 2012
selfserv with PID 24746 started at Tue Nov 27 19:15:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5796: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24746 at Tue Nov 27 19:15:22 EST 2012
kill -USR1 24746
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24746 killed at Tue Nov 27 19:15:22 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:15:22 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24803 >/dev/null 2>/dev/null
selfserv with PID 24803 found at Tue Nov 27 19:15:22 EST 2012
selfserv with PID 24803 started at Tue Nov 27 19:15:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5797: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24803 at Tue Nov 27 19:15:22 EST 2012
kill -USR1 24803
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24803 killed at Tue Nov 27 19:15:22 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:15:22 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24860 >/dev/null 2>/dev/null
selfserv with PID 24860 found at Tue Nov 27 19:15:22 EST 2012
selfserv with PID 24860 started at Tue Nov 27 19:15:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5798: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24860 at Tue Nov 27 19:15:22 EST 2012
kill -USR1 24860
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24860 killed at Tue Nov 27 19:15:22 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:15:22 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24917 >/dev/null 2>/dev/null
selfserv with PID 24917 found at Tue Nov 27 19:15:22 EST 2012
selfserv with PID 24917 started at Tue Nov 27 19:15:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5799: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24917 at Tue Nov 27 19:15:23 EST 2012
kill -USR1 24917
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24917 killed at Tue Nov 27 19:15:23 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:15:23 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24974 >/dev/null 2>/dev/null
selfserv with PID 24974 found at Tue Nov 27 19:15:23 EST 2012
selfserv with PID 24974 started at Tue Nov 27 19:15:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5800: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24974 at Tue Nov 27 19:15:23 EST 2012
kill -USR1 24974
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24974 killed at Tue Nov 27 19:15:23 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:15:23 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25031 >/dev/null 2>/dev/null
selfserv with PID 25031 found at Tue Nov 27 19:15:23 EST 2012
selfserv with PID 25031 started at Tue Nov 27 19:15:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5801: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25031 at Tue Nov 27 19:15:23 EST 2012
kill -USR1 25031
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25031 killed at Tue Nov 27 19:15:23 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:15:23 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25088 >/dev/null 2>/dev/null
selfserv with PID 25088 found at Tue Nov 27 19:15:23 EST 2012
selfserv with PID 25088 started at Tue Nov 27 19:15:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5802: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25088 at Tue Nov 27 19:15:23 EST 2012
kill -USR1 25088
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25088 killed at Tue Nov 27 19:15:23 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:15:23 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25145 >/dev/null 2>/dev/null
selfserv with PID 25145 found at Tue Nov 27 19:15:23 EST 2012
selfserv with PID 25145 started at Tue Nov 27 19:15:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5803: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25145 at Tue Nov 27 19:15:23 EST 2012
kill -USR1 25145
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25145 killed at Tue Nov 27 19:15:23 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:15:24 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25202 >/dev/null 2>/dev/null
selfserv with PID 25202 found at Tue Nov 27 19:15:24 EST 2012
selfserv with PID 25202 started at Tue Nov 27 19:15:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5804: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25202 at Tue Nov 27 19:15:24 EST 2012
kill -USR1 25202
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25202 killed at Tue Nov 27 19:15:24 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:15:24 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25274 >/dev/null 2>/dev/null
selfserv with PID 25274 found at Tue Nov 27 19:15:24 EST 2012
selfserv with PID 25274 started at Tue Nov 27 19:15:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5805: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25274 at Tue Nov 27 19:15:24 EST 2012
kill -USR1 25274
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25274 killed at Tue Nov 27 19:15:24 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:15:24 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25331 >/dev/null 2>/dev/null
selfserv with PID 25331 found at Tue Nov 27 19:15:24 EST 2012
selfserv with PID 25331 started at Tue Nov 27 19:15:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w nss -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5806: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25331 at Tue Nov 27 19:15:24 EST 2012
kill -USR1 25331
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25331 killed at Tue Nov 27 19:15:24 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:15:24 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25388 >/dev/null 2>/dev/null
selfserv with PID 25388 found at Tue Nov 27 19:15:24 EST 2012
selfserv with PID 25388 started at Tue Nov 27 19:15:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5807: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25388 at Tue Nov 27 19:15:24 EST 2012
kill -USR1 25388
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25388 killed at Tue Nov 27 19:15:24 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:15:24 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25445 >/dev/null 2>/dev/null
selfserv with PID 25445 found at Tue Nov 27 19:15:24 EST 2012
selfserv with PID 25445 started at Tue Nov 27 19:15:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5808: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25445 at Tue Nov 27 19:15:25 EST 2012
kill -USR1 25445
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25445 killed at Tue Nov 27 19:15:25 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:15:25 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25502 >/dev/null 2>/dev/null
selfserv with PID 25502 found at Tue Nov 27 19:15:25 EST 2012
selfserv with PID 25502 started at Tue Nov 27 19:15:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5809: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25502 at Tue Nov 27 19:15:25 EST 2012
kill -USR1 25502
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25502 killed at Tue Nov 27 19:15:25 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:15:25 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25559 >/dev/null 2>/dev/null
selfserv with PID 25559 found at Tue Nov 27 19:15:25 EST 2012
selfserv with PID 25559 started at Tue Nov 27 19:15:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5810: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25559 at Tue Nov 27 19:15:25 EST 2012
kill -USR1 25559
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25559 killed at Tue Nov 27 19:15:25 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:15:25 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25616 >/dev/null 2>/dev/null
selfserv with PID 25616 found at Tue Nov 27 19:15:25 EST 2012
selfserv with PID 25616 started at Tue Nov 27 19:15:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5811: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25616 at Tue Nov 27 19:15:25 EST 2012
kill -USR1 25616
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25616 killed at Tue Nov 27 19:15:25 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:15:25 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25673 >/dev/null 2>/dev/null
selfserv with PID 25673 found at Tue Nov 27 19:15:25 EST 2012
selfserv with PID 25673 started at Tue Nov 27 19:15:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V :ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5812: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25673 at Tue Nov 27 19:15:26 EST 2012
kill -USR1 25673
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25673 killed at Tue Nov 27 19:15:26 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:15:26 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25730 >/dev/null 2>/dev/null
selfserv with PID 25730 found at Tue Nov 27 19:15:26 EST 2012
selfserv with PID 25730 started at Tue Nov 27 19:15:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5813: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25730 at Tue Nov 27 19:15:26 EST 2012
kill -USR1 25730
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25730 killed at Tue Nov 27 19:15:26 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:15:26 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25787 >/dev/null 2>/dev/null
selfserv with PID 25787 found at Tue Nov 27 19:15:26 EST 2012
selfserv with PID 25787 started at Tue Nov 27 19:15:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5814: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25787 at Tue Nov 27 19:15:26 EST 2012
kill -USR1 25787
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25787 killed at Tue Nov 27 19:15:26 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:15:26 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25844 >/dev/null 2>/dev/null
selfserv with PID 25844 found at Tue Nov 27 19:15:26 EST 2012
selfserv with PID 25844 started at Tue Nov 27 19:15:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5815: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 25844 at Tue Nov 27 19:15:26 EST 2012
kill -USR1 25844
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25844 killed at Tue Nov 27 19:15:26 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:15:26 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25901 >/dev/null 2>/dev/null
selfserv with PID 25901 found at Tue Nov 27 19:15:26 EST 2012
selfserv with PID 25901 started at Tue Nov 27 19:15:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5816: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25901 at Tue Nov 27 19:15:27 EST 2012
kill -USR1 25901
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25901 killed at Tue Nov 27 19:15:27 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:15:27 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25958 >/dev/null 2>/dev/null
selfserv with PID 25958 found at Tue Nov 27 19:15:27 EST 2012
selfserv with PID 25958 started at Tue Nov 27 19:15:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5817: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25958 at Tue Nov 27 19:15:27 EST 2012
kill -USR1 25958
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25958 killed at Tue Nov 27 19:15:27 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:15:27 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26015 >/dev/null 2>/dev/null
selfserv with PID 26015 found at Tue Nov 27 19:15:27 EST 2012
selfserv with PID 26015 started at Tue Nov 27 19:15:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5818: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26015 at Tue Nov 27 19:15:27 EST 2012
kill -USR1 26015
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26015 killed at Tue Nov 27 19:15:27 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:15:27 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26072 >/dev/null 2>/dev/null
selfserv with PID 26072 found at Tue Nov 27 19:15:27 EST 2012
selfserv with PID 26072 started at Tue Nov 27 19:15:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n TestUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5819: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26072 at Tue Nov 27 19:15:27 EST 2012
kill -USR1 26072
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26072 killed at Tue Nov 27 19:15:27 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:15:27 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26129 >/dev/null 2>/dev/null
selfserv with PID 26129 found at Tue Nov 27 19:15:27 EST 2012
selfserv with PID 26129 started at Tue Nov 27 19:15:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:tls1.0 -w nss -n TestUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5820: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26129 at Tue Nov 27 19:15:27 EST 2012
kill -USR1 26129
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26129 killed at Tue Nov 27 19:15:27 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:15:27 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26186 >/dev/null 2>/dev/null
selfserv with PID 26186 found at Tue Nov 27 19:15:27 EST 2012
selfserv with PID 26186 started at Tue Nov 27 19:15:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5821: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26186 at Tue Nov 27 19:15:28 EST 2012
kill -USR1 26186
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26186 killed at Tue Nov 27 19:15:28 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:15:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26243 >/dev/null 2>/dev/null
selfserv with PID 26243 found at Tue Nov 27 19:15:28 EST 2012
selfserv with PID 26243 started at Tue Nov 27 19:15:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5822: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26243 at Tue Nov 27 19:15:28 EST 2012
kill -USR1 26243
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26243 killed at Tue Nov 27 19:15:28 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:15:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26300 >/dev/null 2>/dev/null
selfserv with PID 26300 found at Tue Nov 27 19:15:28 EST 2012
selfserv with PID 26300 started at Tue Nov 27 19:15:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5823: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26300 at Tue Nov 27 19:15:28 EST 2012
kill -USR1 26300
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26300 killed at Tue Nov 27 19:15:28 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:15:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26357 >/dev/null 2>/dev/null
selfserv with PID 26357 found at Tue Nov 27 19:15:28 EST 2012
selfserv with PID 26357 started at Tue Nov 27 19:15:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -n TestUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5824: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26357 at Tue Nov 27 19:15:28 EST 2012
kill -USR1 26357
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26357 killed at Tue Nov 27 19:15:28 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 19:15:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26435 >/dev/null 2>/dev/null
selfserv with PID 26435 found at Tue Nov 27 19:15:28 EST 2012
selfserv with PID 26435 started at Tue Nov 27 19:15:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5825: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26435 at Tue Nov 27 19:15:29 EST 2012
kill -USR1 26435
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26435 killed at Tue Nov 27 19:15:29 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 19:15:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26498 >/dev/null 2>/dev/null
selfserv with PID 26498 found at Tue Nov 27 19:15:29 EST 2012
selfserv with PID 26498 started at Tue Nov 27 19:15:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5826: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26498 at Tue Nov 27 19:15:29 EST 2012
kill -USR1 26498
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26498 killed at Tue Nov 27 19:15:29 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 19:15:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26561 >/dev/null 2>/dev/null
selfserv with PID 26561 found at Tue Nov 27 19:15:29 EST 2012
selfserv with PID 26561 started at Tue Nov 27 19:15:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #5827: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26561 at Tue Nov 27 19:15:29 EST 2012
kill -USR1 26561
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26561 killed at Tue Nov 27 19:15:29 EST 2012
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Tue Nov 27 19:15:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26624 >/dev/null 2>/dev/null
selfserv with PID 26624 found at Tue Nov 27 19:15:29 EST 2012
selfserv with PID 26624 started at Tue Nov 27 19:15:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5828: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26624 at Tue Nov 27 19:15:29 EST 2012
kill -USR1 26624
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26624 killed at Tue Nov 27 19:15:29 EST 2012
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Tue Nov 27 19:15:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26687 >/dev/null 2>/dev/null
selfserv with PID 26687 found at Tue Nov 27 19:15:29 EST 2012
selfserv with PID 26687 started at Tue Nov 27 19:15:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3:ssl3 -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #5829: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26687 at Tue Nov 27 19:15:29 EST 2012
kill -USR1 26687
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26687 killed at Tue Nov 27 19:15:29 EST 2012
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Tue Nov 27 19:15:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26750 >/dev/null 2>/dev/null
selfserv with PID 26750 found at Tue Nov 27 19:15:29 EST 2012
selfserv with PID 26750 started at Tue Nov 27 19:15:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5830: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26750 at Tue Nov 27 19:15:30 EST 2012
kill -USR1 26750
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26750 killed at Tue Nov 27 19:15:30 EST 2012
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Tue Nov 27 19:15:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26813 >/dev/null 2>/dev/null
selfserv with PID 26813 found at Tue Nov 27 19:15:30 EST 2012
selfserv with PID 26813 started at Tue Nov 27 19:15:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5831: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26813 at Tue Nov 27 19:15:30 EST 2012
kill -USR1 26813
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26813 killed at Tue Nov 27 19:15:30 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Tue Nov 27 19:15:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26876 >/dev/null 2>/dev/null
selfserv with PID 26876 found at Tue Nov 27 19:15:30 EST 2012
selfserv with PID 26876 started at Tue Nov 27 19:15:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: Cannot communicate securely with peer: no common encryption algorithm(s).
tstclnt: exiting with return code 1
ssl.sh: #5832: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26876 at Tue Nov 27 19:15:30 EST 2012
kill -USR1 26876
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26876 killed at Tue Nov 27 19:15:30 EST 2012
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Tue Nov 27 19:15:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26939 >/dev/null 2>/dev/null
selfserv with PID 26939 found at Tue Nov 27 19:15:30 EST 2012
selfserv with PID 26939 started at Tue Nov 27 19:15:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni.usersys.redhat.com -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02-sni.usersys.redhat.com,E=buildnss02-sni.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #5833: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26939 at Tue Nov 27 19:15:30 EST 2012
kill -USR1 26939
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26939 killed at Tue Nov 27 19:15:30 EST 2012
ssl.sh: TLS Server response with alert ----
selfserv starting at Tue Nov 27 19:15:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27002 >/dev/null 2>/dev/null
selfserv with PID 27002 found at Tue Nov 27 19:15:30 EST 2012
selfserv with PID 27002 started at Tue Nov 27 19:15:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v -B -s \
        -V ssl3: -w nss -n TestUser -a buildnss02-sni1.usersys.redhat.com  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #5834: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27002 at Tue Nov 27 19:15:30 EST 2012
kill -USR1 27002
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27002 killed at Tue Nov 27 19:15:31 EST 2012
ssl.sh: SSL Stress Test  - server bypass/client bypass  - with ECC ===============================
ssl.sh: Stress SSL2 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:15:31 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27134 >/dev/null 2>/dev/null
selfserv with PID 27134 found at Tue Nov 27 19:15:31 EST 2012
selfserv with PID 27134 started at Tue Nov 27 19:15:31 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C A \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:31 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: SSL2 - 1 server certificates tested.
strsclnt completed at Tue Nov 27 19:15:31 EST 2012
ssl.sh: #5835: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27134 at Tue Nov 27 19:15:31 EST 2012
kill -USR1 27134
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27134 killed at Tue Nov 27 19:15:31 EST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:15:31 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27211 >/dev/null 2>/dev/null
selfserv with PID 27211 found at Tue Nov 27 19:15:31 EST 2012
selfserv with PID 27211 started at Tue Nov 27 19:15:31 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C c -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:31 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:15:31 EST 2012
ssl.sh: #5836: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27211 at Tue Nov 27 19:15:31 EST 2012
kill -USR1 27211
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27211 killed at Tue Nov 27 19:15:31 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:15:31 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27287 >/dev/null 2>/dev/null
selfserv with PID 27287 found at Tue Nov 27 19:15:31 EST 2012
selfserv with PID 27287 started at Tue Nov 27 19:15:31 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C c \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:31 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:15:32 EST 2012
ssl.sh: #5837: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27287 at Tue Nov 27 19:15:32 EST 2012
kill -USR1 27287
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27287 killed at Tue Nov 27 19:15:32 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 19:15:32 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27363 >/dev/null 2>/dev/null
selfserv with PID 27363 found at Tue Nov 27 19:15:32 EST 2012
selfserv with PID 27363 started at Tue Nov 27 19:15:32 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C c -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:32 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:15:32 EST 2012
ssl.sh: #5838: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27363 at Tue Nov 27 19:15:32 EST 2012
kill -USR1 27363
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27363 killed at Tue Nov 27 19:15:32 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 19:15:32 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27439 >/dev/null 2>/dev/null
selfserv with PID 27439 found at Tue Nov 27 19:15:32 EST 2012
selfserv with PID 27439 started at Tue Nov 27 19:15:32 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:32 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:15:33 EST 2012
ssl.sh: #5839: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27439 at Tue Nov 27 19:15:33 EST 2012
kill -USR1 27439
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27439 killed at Tue Nov 27 19:15:33 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 19:15:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27515 >/dev/null 2>/dev/null
selfserv with PID 27515 found at Tue Nov 27 19:15:33 EST 2012
selfserv with PID 27515 started at Tue Nov 27 19:15:33 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:33 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:15:33 EST 2012
ssl.sh: #5840: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27515 at Tue Nov 27 19:15:33 EST 2012
kill -USR1 27515
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27515 killed at Tue Nov 27 19:15:33 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 19:15:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27591 >/dev/null 2>/dev/null
selfserv with PID 27591 found at Tue Nov 27 19:15:33 EST 2012
selfserv with PID 27591 started at Tue Nov 27 19:15:33 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:33 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:15:33 EST 2012
ssl.sh: #5841: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27591 at Tue Nov 27 19:15:33 EST 2012
kill -USR1 27591
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27591 killed at Tue Nov 27 19:15:33 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 19:15:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27667 >/dev/null 2>/dev/null
selfserv with PID 27667 found at Tue Nov 27 19:15:34 EST 2012
selfserv with PID 27667 started at Tue Nov 27 19:15:34 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:34 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:15:34 EST 2012
ssl.sh: #5842: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27667 at Tue Nov 27 19:15:34 EST 2012
kill -USR1 27667
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27667 killed at Tue Nov 27 19:15:34 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Tue Nov 27 19:15:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27749 >/dev/null 2>/dev/null
selfserv with PID 27749 found at Tue Nov 27 19:15:34 EST 2012
selfserv with PID 27749 started at Tue Nov 27 19:15:34 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:34 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:15:34 EST 2012
ssl.sh: #5843: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27749 at Tue Nov 27 19:15:34 EST 2012
kill -USR1 27749
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27749 killed at Tue Nov 27 19:15:34 EST 2012
ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:15:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27846 >/dev/null 2>/dev/null
selfserv with PID 27846 found at Tue Nov 27 19:15:35 EST 2012
selfserv with PID 27846 started at Tue Nov 27 19:15:35 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:35 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: SSL2 - 100 server certificates tested.
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:15:35 EST 2012
ssl.sh: #5844: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27846 at Tue Nov 27 19:15:35 EST 2012
kill -USR1 27846
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27846 killed at Tue Nov 27 19:15:35 EST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:15:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27921 >/dev/null 2>/dev/null
selfserv with PID 27921 found at Tue Nov 27 19:15:35 EST 2012
selfserv with PID 27921 started at Tue Nov 27 19:15:35 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:35 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:15:36 EST 2012
ssl.sh: #5845: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27921 at Tue Nov 27 19:15:36 EST 2012
kill -USR1 27921
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27921 killed at Tue Nov 27 19:15:36 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:15:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27996 >/dev/null 2>/dev/null
selfserv with PID 27996 found at Tue Nov 27 19:15:36 EST 2012
selfserv with PID 27996 started at Tue Nov 27 19:15:36 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:36 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:15:37 EST 2012
ssl.sh: #5846: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27996 at Tue Nov 27 19:15:37 EST 2012
kill -USR1 27996
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27996 killed at Tue Nov 27 19:15:37 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:15:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28071 >/dev/null 2>/dev/null
selfserv with PID 28071 found at Tue Nov 27 19:15:37 EST 2012
selfserv with PID 28071 started at Tue Nov 27 19:15:37 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:37 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:15:37 EST 2012
ssl.sh: #5847: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28071 at Tue Nov 27 19:15:37 EST 2012
kill -USR1 28071
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28071 killed at Tue Nov 27 19:15:37 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 19:15:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28147 >/dev/null 2>/dev/null
selfserv with PID 28147 found at Tue Nov 27 19:15:37 EST 2012
selfserv with PID 28147 started at Tue Nov 27 19:15:37 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:37 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:15:37 EST 2012
ssl.sh: #5848: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28147 at Tue Nov 27 19:15:37 EST 2012
kill -USR1 28147
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28147 killed at Tue Nov 27 19:15:37 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:15:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28223 >/dev/null 2>/dev/null
selfserv with PID 28223 found at Tue Nov 27 19:15:37 EST 2012
selfserv with PID 28223 started at Tue Nov 27 19:15:37 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:37 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:15:37 EST 2012
ssl.sh: #5849: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28223 at Tue Nov 27 19:15:37 EST 2012
kill -USR1 28223
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28223 killed at Tue Nov 27 19:15:38 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 19:15:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28299 >/dev/null 2>/dev/null
selfserv with PID 28299 found at Tue Nov 27 19:15:38 EST 2012
selfserv with PID 28299 started at Tue Nov 27 19:15:38 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:38 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:15:38 EST 2012
ssl.sh: #5850: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28299 at Tue Nov 27 19:15:38 EST 2012
kill -USR1 28299
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28299 killed at Tue Nov 27 19:15:38 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:15:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28375 >/dev/null 2>/dev/null
selfserv with PID 28375 found at Tue Nov 27 19:15:38 EST 2012
selfserv with PID 28375 started at Tue Nov 27 19:15:38 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:38 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:15:38 EST 2012
ssl.sh: #5851: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28375 at Tue Nov 27 19:15:38 EST 2012
kill -USR1 28375
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28375 killed at Tue Nov 27 19:15:38 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Tue Nov 27 19:15:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28457 >/dev/null 2>/dev/null
selfserv with PID 28457 found at Tue Nov 27 19:15:38 EST 2012
selfserv with PID 28457 started at Tue Nov 27 19:15:38 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:38 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:15:39 EST 2012
ssl.sh: #5852: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28457 at Tue Nov 27 19:15:39 EST 2012
kill -USR1 28457
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28457 killed at Tue Nov 27 19:15:39 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Tue Nov 27 19:15:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -k buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28539 >/dev/null 2>/dev/null
selfserv with PID 28539 found at Tue Nov 27 19:15:39 EST 2012
selfserv with PID 28539 started at Tue Nov 27 19:15:39 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a buildnss02-sni.usersys.redhat.com \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:39 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:15:39 EST 2012
ssl.sh: #5853: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28539 at Tue Nov 27 19:15:39 EST 2012
kill -USR1 28539
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28539 killed at Tue Nov 27 19:15:39 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:15:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28636 >/dev/null 2>/dev/null
selfserv with PID 28636 found at Tue Nov 27 19:15:39 EST 2012
selfserv with PID 28636 started at Tue Nov 27 19:15:39 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:39 EST 2012
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:15:40 EST 2012
ssl.sh: #5854: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28636 at Tue Nov 27 19:15:40 EST 2012
kill -USR1 28636
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28636 killed at Tue Nov 27 19:15:40 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:15:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28711 >/dev/null 2>/dev/null
selfserv with PID 28711 found at Tue Nov 27 19:15:40 EST 2012
selfserv with PID 28711 started at Tue Nov 27 19:15:40 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:40 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:15:40 EST 2012
ssl.sh: #5855: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28711 at Tue Nov 27 19:15:40 EST 2012
kill -USR1 28711
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28711 killed at Tue Nov 27 19:15:40 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:15:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28788 >/dev/null 2>/dev/null
selfserv with PID 28788 found at Tue Nov 27 19:15:40 EST 2012
selfserv with PID 28788 started at Tue Nov 27 19:15:40 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:41 EST 2012
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: (pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:15:41 EST 2012
ssl.sh: #5856: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28788 at Tue Nov 27 19:15:41 EST 2012
kill -USR1 28788
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28788 killed at Tue Nov 27 19:15:41 EST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:15:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28863 >/dev/null 2>/dev/null
selfserv with PID 28863 found at Tue Nov 27 19:15:42 EST 2012
selfserv with PID 28863 started at Tue Nov 27 19:15:42 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:42 EST 2012
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:15:42 EST 2012
ssl.sh: #5857: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28863 at Tue Nov 27 19:15:42 EST 2012
kill -USR1 28863
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28863 killed at Tue Nov 27 19:15:42 EST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:15:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28938 >/dev/null 2>/dev/null
selfserv with PID 28938 found at Tue Nov 27 19:15:42 EST 2012
selfserv with PID 28938 started at Tue Nov 27 19:15:42 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:42 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:15:43 EST 2012
ssl.sh: #5858: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28938 at Tue Nov 27 19:15:43 EST 2012
kill -USR1 28938
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28938 killed at Tue Nov 27 19:15:43 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 19:15:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29014 >/dev/null 2>/dev/null
selfserv with PID 29014 found at Tue Nov 27 19:15:43 EST 2012
selfserv with PID 29014 started at Tue Nov 27 19:15:43 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:43 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:15:43 EST 2012
ssl.sh: #5859: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29014 at Tue Nov 27 19:15:43 EST 2012
kill -USR1 29014
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29014 killed at Tue Nov 27 19:15:43 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:15:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29111 >/dev/null 2>/dev/null
selfserv with PID 29111 found at Tue Nov 27 19:15:43 EST 2012
selfserv with PID 29111 started at Tue Nov 27 19:15:43 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:43 EST 2012
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:15:44 EST 2012
ssl.sh: #5860: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29111 at Tue Nov 27 19:15:44 EST 2012
kill -USR1 29111
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29111 killed at Tue Nov 27 19:15:44 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 19:15:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29186 >/dev/null 2>/dev/null
selfserv with PID 29186 found at Tue Nov 27 19:15:44 EST 2012
selfserv with PID 29186 started at Tue Nov 27 19:15:44 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:44 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:15:44 EST 2012
ssl.sh: #5861: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29186 at Tue Nov 27 19:15:44 EST 2012
kill -USR1 29186
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29186 killed at Tue Nov 27 19:15:44 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:15:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29262 >/dev/null 2>/dev/null
selfserv with PID 29262 found at Tue Nov 27 19:15:44 EST 2012
selfserv with PID 29262 started at Tue Nov 27 19:15:44 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 10 -C :C004 -N -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:44 EST 2012
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: (PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: (pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:15:44 EST 2012
ssl.sh: #5862: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29262 at Tue Nov 27 19:15:44 EST 2012
kill -USR1 29262
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29262 killed at Tue Nov 27 19:15:44 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:15:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29337 >/dev/null 2>/dev/null
selfserv with PID 29337 found at Tue Nov 27 19:15:45 EST 2012
selfserv with PID 29337 started at Tue Nov 27 19:15:45 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:45 EST 2012
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:15:45 EST 2012
ssl.sh: #5863: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29337 at Tue Nov 27 19:15:45 EST 2012
kill -USR1 29337
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29337 killed at Tue Nov 27 19:15:45 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 19:15:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29412 >/dev/null 2>/dev/null
selfserv with PID 29412 found at Tue Nov 27 19:15:45 EST 2012
selfserv with PID 29412 started at Tue Nov 27 19:15:45 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C :C013 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:45 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:15:45 EST 2012
ssl.sh: #5864: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29412 at Tue Nov 27 19:15:45 EST 2012
kill -USR1 29412
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29412 killed at Tue Nov 27 19:15:45 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:15:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29488 >/dev/null 2>/dev/null
selfserv with PID 29488 found at Tue Nov 27 19:15:45 EST 2012
selfserv with PID 29488 started at Tue Nov 27 19:15:45 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:15:45 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:15:45 EST 2012
ssl.sh: #5865: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29488 at Tue Nov 27 19:15:45 EST 2012
kill -USR1 29488
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29488 killed at Tue Nov 27 19:15:45 EST 2012
ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client bypass  - with ECC ===============================
selfserv starting at Tue Nov 27 19:15:45 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:46 EST 2012
selfserv with PID 29552 started at Tue Nov 27 19:15:46 EST 2012
ssl.sh: skipping  SSL2_RC4_128_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_192_EDE3_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC4_128_EXPORT40_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_RC2_128_CBC_WITH_MD5 for Extended Test
ssl.sh: skipping  SSL2_DES_64_CBC_WITH_MD5 for Extended Test
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5866: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5867: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5868: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5869: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5870: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5871: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5872: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5873: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5874: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5875: SSL3_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5876: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5877: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5878: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5879: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5880: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5881: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5882: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c f -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5883: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c g -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 512-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5884: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5885: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5886: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5887: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5888: TLS_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5889: TLS_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5890: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5891: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5892: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5893: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c c -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5894: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c d -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5895: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c e -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5896: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c i -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5897: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c j -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5898: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c k -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5899: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c l -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5900: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA   (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c m -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5901: TLS11_RSA_EXPORT_WITH_RC4_56_SHA    (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c n -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5902: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c v -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5903: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c y -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5904: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c z -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5905: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5906: SSL3_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5907: SSL3_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5908: SSL3_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5909: SSL3_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5910: SSL3_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5911: SSL3_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5912: SSL3_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5913: SSL3_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5914: SSL3_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29552 >/dev/null 2>/dev/null
selfserv with PID 29552 found at Tue Nov 27 19:15:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5915: SSL3_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 29552 at Tue Nov 27 19:15:50 EST 2012
kill -USR1 29552
selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29552 killed at Tue Nov 27 19:15:50 EST 2012
ssl.sh: SSL3_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:15:50 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30971 >/dev/null 2>/dev/null
selfserv with PID 30971 found at Tue Nov 27 19:15:50 EST 2012
selfserv with PID 30971 started at Tue Nov 27 19:15:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5916: SSL3_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30971 >/dev/null 2>/dev/null
selfserv with PID 30971 found at Tue Nov 27 19:15:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5917: SSL3_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30971 >/dev/null 2>/dev/null
selfserv with PID 30971 found at Tue Nov 27 19:15:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5918: SSL3_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30971 >/dev/null 2>/dev/null
selfserv with PID 30971 found at Tue Nov 27 19:15:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5919: SSL3_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30971 >/dev/null 2>/dev/null
selfserv with PID 30971 found at Tue Nov 27 19:15:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5920: SSL3_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 30971 at Tue Nov 27 19:15:50 EST 2012
kill -USR1 30971
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30971 killed at Tue Nov 27 19:15:50 EST 2012
ssl.sh: SSL3_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:15:50 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31119 >/dev/null 2>/dev/null
selfserv with PID 31119 found at Tue Nov 27 19:15:50 EST 2012
selfserv with PID 31119 started at Tue Nov 27 19:15:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5921: SSL3_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31119 >/dev/null 2>/dev/null
selfserv with PID 31119 found at Tue Nov 27 19:15:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5922: SSL3_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31119 >/dev/null 2>/dev/null
selfserv with PID 31119 found at Tue Nov 27 19:15:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5923: SSL3_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31119 >/dev/null 2>/dev/null
selfserv with PID 31119 found at Tue Nov 27 19:15:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5924: SSL3_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31119 >/dev/null 2>/dev/null
selfserv with PID 31119 found at Tue Nov 27 19:15:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5925: SSL3_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 31119 >/dev/null 2>/dev/null
selfserv with PID 31119 found at Tue Nov 27 19:15:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5926: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 31119 >/dev/null 2>/dev/null
selfserv with PID 31119 found at Tue Nov 27 19:15:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5927: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31119 >/dev/null 2>/dev/null
selfserv with PID 31119 found at Tue Nov 27 19:15:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5928: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31119 >/dev/null 2>/dev/null
selfserv with PID 31119 found at Tue Nov 27 19:15:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5929: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31119 >/dev/null 2>/dev/null
selfserv with PID 31119 found at Tue Nov 27 19:15:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5930: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 31119 >/dev/null 2>/dev/null
selfserv with PID 31119 found at Tue Nov 27 19:15:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5931: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 31119 >/dev/null 2>/dev/null
selfserv with PID 31119 found at Tue Nov 27 19:15:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5932: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31119 >/dev/null 2>/dev/null
selfserv with PID 31119 found at Tue Nov 27 19:15:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5933: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31119 >/dev/null 2>/dev/null
selfserv with PID 31119 found at Tue Nov 27 19:15:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5934: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31119 >/dev/null 2>/dev/null
selfserv with PID 31119 found at Tue Nov 27 19:15:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5935: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 31119 at Tue Nov 27 19:15:52 EST 2012
kill -USR1 31119
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31119 killed at Tue Nov 27 19:15:52 EST 2012
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:15:52 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31518 >/dev/null 2>/dev/null
selfserv with PID 31518 found at Tue Nov 27 19:15:52 EST 2012
selfserv with PID 31518 started at Tue Nov 27 19:15:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5936: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31518 >/dev/null 2>/dev/null
selfserv with PID 31518 found at Tue Nov 27 19:15:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5937: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31518 >/dev/null 2>/dev/null
selfserv with PID 31518 found at Tue Nov 27 19:15:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5938: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31518 >/dev/null 2>/dev/null
selfserv with PID 31518 found at Tue Nov 27 19:15:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5939: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31518 >/dev/null 2>/dev/null
selfserv with PID 31518 found at Tue Nov 27 19:15:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5940: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 31518 at Tue Nov 27 19:15:52 EST 2012
kill -USR1 31518
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31518 killed at Tue Nov 27 19:15:52 EST 2012
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:15:52 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31666 >/dev/null 2>/dev/null
selfserv with PID 31666 found at Tue Nov 27 19:15:52 EST 2012
selfserv with PID 31666 started at Tue Nov 27 19:15:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5941: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31666 >/dev/null 2>/dev/null
selfserv with PID 31666 found at Tue Nov 27 19:15:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5942: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31666 >/dev/null 2>/dev/null
selfserv with PID 31666 found at Tue Nov 27 19:15:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5943: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31666 >/dev/null 2>/dev/null
selfserv with PID 31666 found at Tue Nov 27 19:15:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5944: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31666 >/dev/null 2>/dev/null
selfserv with PID 31666 found at Tue Nov 27 19:15:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:ssl3  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5945: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 31666 >/dev/null 2>/dev/null
selfserv with PID 31666 found at Tue Nov 27 19:15:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C001 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5946: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 31666 >/dev/null 2>/dev/null
selfserv with PID 31666 found at Tue Nov 27 19:15:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C002 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5947: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31666 >/dev/null 2>/dev/null
selfserv with PID 31666 found at Tue Nov 27 19:15:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C003 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5948: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31666 >/dev/null 2>/dev/null
selfserv with PID 31666 found at Tue Nov 27 19:15:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C004 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5949: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31666 >/dev/null 2>/dev/null
selfserv with PID 31666 found at Tue Nov 27 19:15:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C005 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 16-bit ECDSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5950: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 31666 >/dev/null 2>/dev/null
selfserv with PID 31666 found at Tue Nov 27 19:15:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C006 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5951: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 31666 >/dev/null 2>/dev/null
selfserv with PID 31666 found at Tue Nov 27 19:15:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C007 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5952: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31666 >/dev/null 2>/dev/null
selfserv with PID 31666 found at Tue Nov 27 19:15:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C008 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5953: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31666 >/dev/null 2>/dev/null
selfserv with PID 31666 found at Tue Nov 27 19:15:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C009 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5954: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31666 >/dev/null 2>/dev/null
selfserv with PID 31666 found at Tue Nov 27 19:15:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00A -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5955: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 31666 at Tue Nov 27 19:15:54 EST 2012
kill -USR1 31666
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31666 killed at Tue Nov 27 19:15:54 EST 2012
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:15:54 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32051 >/dev/null 2>/dev/null
selfserv with PID 32051 found at Tue Nov 27 19:15:54 EST 2012
selfserv with PID 32051 started at Tue Nov 27 19:15:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00B -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5956: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32051 >/dev/null 2>/dev/null
selfserv with PID 32051 found at Tue Nov 27 19:15:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00C -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5957: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32051 >/dev/null 2>/dev/null
selfserv with PID 32051 found at Tue Nov 27 19:15:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00D -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5958: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32051 >/dev/null 2>/dev/null
selfserv with PID 32051 found at Tue Nov 27 19:15:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00E -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5959: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32051 >/dev/null 2>/dev/null
selfserv with PID 32051 found at Tue Nov 27 19:15:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C00F -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 256-bit ECDH
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5960: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 32051 at Tue Nov 27 19:15:55 EST 2012
kill -USR1 32051
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32051 killed at Tue Nov 27 19:15:55 EST 2012
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Tue Nov 27 19:15:55 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c ABCDEF:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:0041:0084cdefgijklmnvyz -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32199 >/dev/null 2>/dev/null
selfserv with PID 32199 found at Tue Nov 27 19:15:55 EST 2012
selfserv with PID 32199 started at Tue Nov 27 19:15:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C010 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5961: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 32199 >/dev/null 2>/dev/null
selfserv with PID 32199 found at Tue Nov 27 19:15:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C011 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5962: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 32199 >/dev/null 2>/dev/null
selfserv with PID 32199 found at Tue Nov 27 19:15:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C012 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5963: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 32199 >/dev/null 2>/dev/null
selfserv with PID 32199 found at Tue Nov 27 19:15:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C013 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5964: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 32199 >/dev/null 2>/dev/null
selfserv with PID 32199 found at Tue Nov 27 19:15:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -c :C014 -V ssl3:tls1.1  -B -s \
        -f -d ../ext_client -v -w nss < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 192-bit ECDHE
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5965: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32199 at Tue Nov 27 19:15:55 EST 2012
kill -USR1 32199
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32199 killed at Tue Nov 27 19:15:55 EST 2012
ssl.sh: SSL Client Authentication Extended Test - server bypass/client bypass  - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:15:55 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32399 >/dev/null 2>/dev/null
selfserv with PID 32399 found at Tue Nov 27 19:15:55 EST 2012
selfserv with PID 32399 started at Tue Nov 27 19:15:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5966: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32399 at Tue Nov 27 19:15:55 EST 2012
kill -USR1 32399
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32399 killed at Tue Nov 27 19:15:56 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:15:56 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32456 >/dev/null 2>/dev/null
selfserv with PID 32456 found at Tue Nov 27 19:15:56 EST 2012
selfserv with PID 32456 started at Tue Nov 27 19:15:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5967: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32456 at Tue Nov 27 19:15:56 EST 2012
kill -USR1 32456
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32456 killed at Tue Nov 27 19:15:56 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:15:56 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32513 >/dev/null 2>/dev/null
selfserv with PID 32513 found at Tue Nov 27 19:15:56 EST 2012
selfserv with PID 32513 started at Tue Nov 27 19:15:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5968: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32513 at Tue Nov 27 19:15:56 EST 2012
kill -USR1 32513
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32513 killed at Tue Nov 27 19:15:56 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:15:56 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32570 >/dev/null 2>/dev/null
selfserv with PID 32570 found at Tue Nov 27 19:15:56 EST 2012
selfserv with PID 32570 started at Tue Nov 27 19:15:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5969: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32570 at Tue Nov 27 19:15:56 EST 2012
kill -USR1 32570
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32570 killed at Tue Nov 27 19:15:56 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:15:56 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32627 >/dev/null 2>/dev/null
selfserv with PID 32627 found at Tue Nov 27 19:15:56 EST 2012
selfserv with PID 32627 started at Tue Nov 27 19:15:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5970: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32627 at Tue Nov 27 19:15:56 EST 2012
kill -USR1 32627
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32627 killed at Tue Nov 27 19:15:56 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:15:56 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32684 >/dev/null 2>/dev/null
selfserv with PID 32684 found at Tue Nov 27 19:15:56 EST 2012
selfserv with PID 32684 started at Tue Nov 27 19:15:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5971: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32684 at Tue Nov 27 19:15:57 EST 2012
kill -USR1 32684
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32684 killed at Tue Nov 27 19:15:57 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:15:57 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32741 >/dev/null 2>/dev/null
selfserv with PID 32741 found at Tue Nov 27 19:15:57 EST 2012
selfserv with PID 32741 started at Tue Nov 27 19:15:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5972: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32741 at Tue Nov 27 19:15:57 EST 2012
kill -USR1 32741
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32741 killed at Tue Nov 27 19:15:57 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:15:57 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 333 >/dev/null 2>/dev/null
selfserv with PID 333 found at Tue Nov 27 19:15:57 EST 2012
selfserv with PID 333 started at Tue Nov 27 19:15:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5973: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 333 at Tue Nov 27 19:15:57 EST 2012
kill -USR1 333
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 333 killed at Tue Nov 27 19:15:57 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:15:57 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 392 >/dev/null 2>/dev/null
selfserv with PID 392 found at Tue Nov 27 19:15:57 EST 2012
selfserv with PID 392 started at Tue Nov 27 19:15:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5974: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 392 at Tue Nov 27 19:15:57 EST 2012
kill -USR1 392
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 392 killed at Tue Nov 27 19:15:57 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:15:57 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 455 >/dev/null 2>/dev/null
selfserv with PID 455 found at Tue Nov 27 19:15:57 EST 2012
selfserv with PID 455 started at Tue Nov 27 19:15:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5975: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 455 at Tue Nov 27 19:15:57 EST 2012
kill -USR1 455
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 455 killed at Tue Nov 27 19:15:57 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:15:57 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 523 >/dev/null 2>/dev/null
selfserv with PID 523 found at Tue Nov 27 19:15:58 EST 2012
selfserv with PID 523 started at Tue Nov 27 19:15:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5976: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 523 at Tue Nov 27 19:15:58 EST 2012
kill -USR1 523
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 523 killed at Tue Nov 27 19:15:58 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:15:58 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 595 >/dev/null 2>/dev/null
selfserv with PID 595 found at Tue Nov 27 19:15:58 EST 2012
selfserv with PID 595 started at Tue Nov 27 19:15:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5977: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 595 at Tue Nov 27 19:15:58 EST 2012
kill -USR1 595
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 595 killed at Tue Nov 27 19:15:58 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:15:58 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 665 >/dev/null 2>/dev/null
selfserv with PID 665 found at Tue Nov 27 19:15:58 EST 2012
selfserv with PID 665 started at Tue Nov 27 19:15:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5978: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 665 at Tue Nov 27 19:15:58 EST 2012
kill -USR1 665
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 665 killed at Tue Nov 27 19:15:58 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:15:58 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 729 >/dev/null 2>/dev/null
selfserv with PID 729 found at Tue Nov 27 19:15:58 EST 2012
selfserv with PID 729 started at Tue Nov 27 19:15:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5979: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 729 at Tue Nov 27 19:15:58 EST 2012
kill -USR1 729
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 729 killed at Tue Nov 27 19:15:58 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:15:58 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 786 >/dev/null 2>/dev/null
selfserv with PID 786 found at Tue Nov 27 19:15:58 EST 2012
selfserv with PID 786 started at Tue Nov 27 19:15:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5980: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 786 at Tue Nov 27 19:15:59 EST 2012
kill -USR1 786
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 786 killed at Tue Nov 27 19:15:59 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:15:59 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 858 >/dev/null 2>/dev/null
selfserv with PID 858 found at Tue Nov 27 19:15:59 EST 2012
selfserv with PID 858 started at Tue Nov 27 19:15:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5981: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 858 at Tue Nov 27 19:15:59 EST 2012
kill -USR1 858
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 858 killed at Tue Nov 27 19:15:59 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:15:59 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 934 >/dev/null 2>/dev/null
selfserv with PID 934 found at Tue Nov 27 19:15:59 EST 2012
selfserv with PID 934 started at Tue Nov 27 19:15:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5982: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 934 at Tue Nov 27 19:15:59 EST 2012
kill -USR1 934
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 934 killed at Tue Nov 27 19:15:59 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:15:59 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1014 >/dev/null 2>/dev/null
selfserv with PID 1014 found at Tue Nov 27 19:15:59 EST 2012
selfserv with PID 1014 started at Tue Nov 27 19:15:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5983: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1014 at Tue Nov 27 19:15:59 EST 2012
kill -USR1 1014
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1014 killed at Tue Nov 27 19:15:59 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:15:59 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:15:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1071 >/dev/null 2>/dev/null
selfserv with PID 1071 found at Tue Nov 27 19:15:59 EST 2012
selfserv with PID 1071 started at Tue Nov 27 19:15:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5984: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1071 at Tue Nov 27 19:16:00 EST 2012
kill -USR1 1071
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1071 killed at Tue Nov 27 19:16:00 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:16:00 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1128 >/dev/null 2>/dev/null
selfserv with PID 1128 found at Tue Nov 27 19:16:00 EST 2012
selfserv with PID 1128 started at Tue Nov 27 19:16:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5985: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1128 at Tue Nov 27 19:16:00 EST 2012
kill -USR1 1128
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1128 killed at Tue Nov 27 19:16:00 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:16:00 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1185 >/dev/null 2>/dev/null
selfserv with PID 1185 found at Tue Nov 27 19:16:00 EST 2012
selfserv with PID 1185 started at Tue Nov 27 19:16:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5986: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1185 at Tue Nov 27 19:16:00 EST 2012
kill -USR1 1185
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1185 killed at Tue Nov 27 19:16:00 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:16:00 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1242 >/dev/null 2>/dev/null
selfserv with PID 1242 found at Tue Nov 27 19:16:00 EST 2012
selfserv with PID 1242 started at Tue Nov 27 19:16:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5987: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1242 at Tue Nov 27 19:16:00 EST 2012
kill -USR1 1242
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1242 killed at Tue Nov 27 19:16:00 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:16:00 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1299 >/dev/null 2>/dev/null
selfserv with PID 1299 found at Tue Nov 27 19:16:00 EST 2012
selfserv with PID 1299 started at Tue Nov 27 19:16:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5988: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1299 at Tue Nov 27 19:16:00 EST 2012
kill -USR1 1299
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1299 killed at Tue Nov 27 19:16:00 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:16:00 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1356 >/dev/null 2>/dev/null
selfserv with PID 1356 found at Tue Nov 27 19:16:00 EST 2012
selfserv with PID 1356 started at Tue Nov 27 19:16:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5989: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1356 at Tue Nov 27 19:16:01 EST 2012
kill -USR1 1356
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1356 killed at Tue Nov 27 19:16:01 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:16:01 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1413 >/dev/null 2>/dev/null
selfserv with PID 1413 found at Tue Nov 27 19:16:01 EST 2012
selfserv with PID 1413 started at Tue Nov 27 19:16:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5990: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1413 at Tue Nov 27 19:16:01 EST 2012
kill -USR1 1413
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1413 killed at Tue Nov 27 19:16:01 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:16:01 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1470 >/dev/null 2>/dev/null
selfserv with PID 1470 found at Tue Nov 27 19:16:01 EST 2012
selfserv with PID 1470 started at Tue Nov 27 19:16:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5991: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1470 at Tue Nov 27 19:16:01 EST 2012
kill -USR1 1470
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1470 killed at Tue Nov 27 19:16:01 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:16:01 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1527 >/dev/null 2>/dev/null
selfserv with PID 1527 found at Tue Nov 27 19:16:01 EST 2012
selfserv with PID 1527 started at Tue Nov 27 19:16:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5992: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1527 at Tue Nov 27 19:16:01 EST 2012
kill -USR1 1527
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1527 killed at Tue Nov 27 19:16:01 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:16:01 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1592 >/dev/null 2>/dev/null
selfserv with PID 1592 found at Tue Nov 27 19:16:01 EST 2012
selfserv with PID 1592 started at Tue Nov 27 19:16:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5993: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1592 at Tue Nov 27 19:16:02 EST 2012
kill -USR1 1592
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1592 killed at Tue Nov 27 19:16:02 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:16:02 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1649 >/dev/null 2>/dev/null
selfserv with PID 1649 found at Tue Nov 27 19:16:02 EST 2012
selfserv with PID 1649 started at Tue Nov 27 19:16:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #5994: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1649 at Tue Nov 27 19:16:02 EST 2012
kill -USR1 1649
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1649 killed at Tue Nov 27 19:16:02 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:16:02 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1708 >/dev/null 2>/dev/null
selfserv with PID 1708 found at Tue Nov 27 19:16:02 EST 2012
selfserv with PID 1708 started at Tue Nov 27 19:16:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5995: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1708 at Tue Nov 27 19:16:02 EST 2012
kill -USR1 1708
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1708 killed at Tue Nov 27 19:16:02 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:16:02 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1780 >/dev/null 2>/dev/null
selfserv with PID 1780 found at Tue Nov 27 19:16:02 EST 2012
selfserv with PID 1780 started at Tue Nov 27 19:16:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5996: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1780 at Tue Nov 27 19:16:02 EST 2012
kill -USR1 1780
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1780 killed at Tue Nov 27 19:16:02 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:16:02 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1837 >/dev/null 2>/dev/null
selfserv with PID 1837 found at Tue Nov 27 19:16:02 EST 2012
selfserv with PID 1837 started at Tue Nov 27 19:16:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5997: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1837 at Tue Nov 27 19:16:03 EST 2012
kill -USR1 1837
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1837 killed at Tue Nov 27 19:16:03 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:16:03 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1894 >/dev/null 2>/dev/null
selfserv with PID 1894 found at Tue Nov 27 19:16:03 EST 2012
selfserv with PID 1894 started at Tue Nov 27 19:16:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #5998: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1894 at Tue Nov 27 19:16:03 EST 2012
kill -USR1 1894
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1894 killed at Tue Nov 27 19:16:03 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:16:03 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1951 >/dev/null 2>/dev/null
selfserv with PID 1951 found at Tue Nov 27 19:16:03 EST 2012
selfserv with PID 1951 started at Tue Nov 27 19:16:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #5999: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1951 at Tue Nov 27 19:16:03 EST 2012
kill -USR1 1951
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1951 killed at Tue Nov 27 19:16:03 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:16:03 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2008 >/dev/null 2>/dev/null
selfserv with PID 2008 found at Tue Nov 27 19:16:03 EST 2012
selfserv with PID 2008 started at Tue Nov 27 19:16:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6000: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2008 at Tue Nov 27 19:16:03 EST 2012
kill -USR1 2008
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2008 killed at Tue Nov 27 19:16:03 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:16:03 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2065 >/dev/null 2>/dev/null
selfserv with PID 2065 found at Tue Nov 27 19:16:03 EST 2012
selfserv with PID 2065 started at Tue Nov 27 19:16:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6001: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2065 at Tue Nov 27 19:16:04 EST 2012
kill -USR1 2065
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2065 killed at Tue Nov 27 19:16:04 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:16:04 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2122 >/dev/null 2>/dev/null
selfserv with PID 2122 found at Tue Nov 27 19:16:04 EST 2012
selfserv with PID 2122 started at Tue Nov 27 19:16:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #6002: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2122 at Tue Nov 27 19:16:04 EST 2012
kill -USR1 2122
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2122 killed at Tue Nov 27 19:16:04 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:16:04 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2179 >/dev/null 2>/dev/null
selfserv with PID 2179 found at Tue Nov 27 19:16:04 EST 2012
selfserv with PID 2179 started at Tue Nov 27 19:16:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V :ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6003: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2179 at Tue Nov 27 19:16:04 EST 2012
kill -USR1 2179
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2179 killed at Tue Nov 27 19:16:04 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:16:04 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2237 >/dev/null 2>/dev/null
selfserv with PID 2237 found at Tue Nov 27 19:16:04 EST 2012
selfserv with PID 2237 started at Tue Nov 27 19:16:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6004: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2237 at Tue Nov 27 19:16:04 EST 2012
kill -USR1 2237
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2237 killed at Tue Nov 27 19:16:04 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:16:04 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2294 >/dev/null 2>/dev/null
selfserv with PID 2294 found at Tue Nov 27 19:16:04 EST 2012
selfserv with PID 2294 started at Tue Nov 27 19:16:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6005: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2294 at Tue Nov 27 19:16:05 EST 2012
kill -USR1 2294
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2294 killed at Tue Nov 27 19:16:05 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:16:05 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2351 >/dev/null 2>/dev/null
selfserv with PID 2351 found at Tue Nov 27 19:16:05 EST 2012
selfserv with PID 2351 started at Tue Nov 27 19:16:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6006: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2351 at Tue Nov 27 19:16:05 EST 2012
kill -USR1 2351
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2351 killed at Tue Nov 27 19:16:05 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:16:05 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2408 >/dev/null 2>/dev/null
selfserv with PID 2408 found at Tue Nov 27 19:16:05 EST 2012
selfserv with PID 2408 started at Tue Nov 27 19:16:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3: -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6007: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2408 at Tue Nov 27 19:16:05 EST 2012
kill -USR1 2408
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2408 killed at Tue Nov 27 19:16:05 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:16:05 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2465 >/dev/null 2>/dev/null
selfserv with PID 2465 found at Tue Nov 27 19:16:05 EST 2012
selfserv with PID 2465 started at Tue Nov 27 19:16:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6008: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2465 at Tue Nov 27 19:16:05 EST 2012
kill -USR1 2465
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2465 killed at Tue Nov 27 19:16:05 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:16:05 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2522 >/dev/null 2>/dev/null
selfserv with PID 2522 found at Tue Nov 27 19:16:05 EST 2012
selfserv with PID 2522 started at Tue Nov 27 19:16:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6009: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2522 at Tue Nov 27 19:16:06 EST 2012
kill -USR1 2522
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2522 killed at Tue Nov 27 19:16:06 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:16:06 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2579 >/dev/null 2>/dev/null
selfserv with PID 2579 found at Tue Nov 27 19:16:06 EST 2012
selfserv with PID 2579 started at Tue Nov 27 19:16:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6010: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2579 at Tue Nov 27 19:16:06 EST 2012
kill -USR1 2579
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2579 killed at Tue Nov 27 19:16:06 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:16:06 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2636 >/dev/null 2>/dev/null
selfserv with PID 2636 found at Tue Nov 27 19:16:06 EST 2012
selfserv with PID 2636 started at Tue Nov 27 19:16:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6011: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2636 at Tue Nov 27 19:16:06 EST 2012
kill -USR1 2636
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2636 killed at Tue Nov 27 19:16:06 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:16:06 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2694 >/dev/null 2>/dev/null
selfserv with PID 2694 found at Tue Nov 27 19:16:06 EST 2012
selfserv with PID 2694 started at Tue Nov 27 19:16:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6012: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2694 at Tue Nov 27 19:16:06 EST 2012
kill -USR1 2694
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2694 killed at Tue Nov 27 19:16:06 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:16:06 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2751 >/dev/null 2>/dev/null
selfserv with PID 2751 found at Tue Nov 27 19:16:06 EST 2012
selfserv with PID 2751 started at Tue Nov 27 19:16:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6013: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2751 at Tue Nov 27 19:16:07 EST 2012
kill -USR1 2751
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2751 killed at Tue Nov 27 19:16:07 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:16:07 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2808 >/dev/null 2>/dev/null
selfserv with PID 2808 found at Tue Nov 27 19:16:07 EST 2012
selfserv with PID 2808 started at Tue Nov 27 19:16:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #6014: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2808 at Tue Nov 27 19:16:07 EST 2012
kill -USR1 2808
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2808 killed at Tue Nov 27 19:16:07 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:16:07 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2865 >/dev/null 2>/dev/null
selfserv with PID 2865 found at Tue Nov 27 19:16:07 EST 2012
selfserv with PID 2865 started at Tue Nov 27 19:16:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../ext_client -v -B -s \
        -V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #6015: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2865 at Tue Nov 27 19:16:07 EST 2012
kill -USR1 2865
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2865 killed at Tue Nov 27 19:16:07 EST 2012
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: skipping  SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping  SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping  TLS Server hello response without SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping  TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping  TLS Server response with alert for Extended Test
ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass  - with ECC ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:16:07 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3036 >/dev/null 2>/dev/null
selfserv with PID 3036 found at Tue Nov 27 19:16:07 EST 2012
selfserv with PID 3036 started at Tue Nov 27 19:16:07 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 1000 -C c -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:07 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:16:08 EST 2012
ssl.sh: #6016: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3036 at Tue Nov 27 19:16:08 EST 2012
kill -USR1 3036
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3036 killed at Tue Nov 27 19:16:08 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:16:08 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3112 >/dev/null 2>/dev/null
selfserv with PID 3112 found at Tue Nov 27 19:16:08 EST 2012
selfserv with PID 3112 started at Tue Nov 27 19:16:08 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 1000 -C c \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:08 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:16:08 EST 2012
ssl.sh: #6017: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3112 at Tue Nov 27 19:16:08 EST 2012
kill -USR1 3112
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3112 killed at Tue Nov 27 19:16:08 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 19:16:08 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3188 >/dev/null 2>/dev/null
selfserv with PID 3188 found at Tue Nov 27 19:16:08 EST 2012
selfserv with PID 3188 started at Tue Nov 27 19:16:08 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 1000 -C c -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:08 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:16:09 EST 2012
ssl.sh: #6018: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3188 at Tue Nov 27 19:16:09 EST 2012
kill -USR1 3188
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3188 killed at Tue Nov 27 19:16:09 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 19:16:09 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3264 >/dev/null 2>/dev/null
selfserv with PID 3264 found at Tue Nov 27 19:16:09 EST 2012
selfserv with PID 3264 started at Tue Nov 27 19:16:09 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:09 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:16:09 EST 2012
ssl.sh: #6019: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3264 at Tue Nov 27 19:16:09 EST 2012
kill -USR1 3264
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3264 killed at Tue Nov 27 19:16:09 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 19:16:09 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3340 >/dev/null 2>/dev/null
selfserv with PID 3340 found at Tue Nov 27 19:16:09 EST 2012
selfserv with PID 3340 started at Tue Nov 27 19:16:09 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:09 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:16:09 EST 2012
ssl.sh: #6020: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3340 at Tue Nov 27 19:16:09 EST 2012
kill -USR1 3340
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3340 killed at Tue Nov 27 19:16:09 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 19:16:10 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3416 >/dev/null 2>/dev/null
selfserv with PID 3416 found at Tue Nov 27 19:16:10 EST 2012
selfserv with PID 3416 started at Tue Nov 27 19:16:10 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:10 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:16:10 EST 2012
ssl.sh: #6021: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3416 at Tue Nov 27 19:16:10 EST 2012
kill -USR1 3416
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3416 killed at Tue Nov 27 19:16:10 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 19:16:10 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3492 >/dev/null 2>/dev/null
selfserv with PID 3492 found at Tue Nov 27 19:16:10 EST 2012
selfserv with PID 3492 started at Tue Nov 27 19:16:10 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:10 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:16:11 EST 2012
ssl.sh: #6022: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3492 at Tue Nov 27 19:16:11 EST 2012
kill -USR1 3492
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3492 killed at Tue Nov 27 19:16:11 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:16:11 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3597 >/dev/null 2>/dev/null
selfserv with PID 3597 found at Tue Nov 27 19:16:11 EST 2012
selfserv with PID 3597 started at Tue Nov 27 19:16:11 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:11 EST 2012
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCertChain_Add: strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: strsclnt: -- SSL: Server Certificate Validated.
PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:16:11 EST 2012
ssl.sh: #6023: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3597 at Tue Nov 27 19:16:11 EST 2012
kill -USR1 3597
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3597 killed at Tue Nov 27 19:16:11 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:16:11 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3672 >/dev/null 2>/dev/null
selfserv with PID 3672 found at Tue Nov 27 19:16:11 EST 2012
selfserv with PID 3672 started at Tue Nov 27 19:16:11 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:11 EST 2012
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: (pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:16:12 EST 2012
ssl.sh: #6024: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3672 at Tue Nov 27 19:16:12 EST 2012
kill -USR1 3672
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3672 killed at Tue Nov 27 19:16:12 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:16:12 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3747 >/dev/null 2>/dev/null
selfserv with PID 3747 found at Tue Nov 27 19:16:12 EST 2012
selfserv with PID 3747 started at Tue Nov 27 19:16:12 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:12 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:16:12 EST 2012
ssl.sh: #6025: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3747 at Tue Nov 27 19:16:12 EST 2012
kill -USR1 3747
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3747 killed at Tue Nov 27 19:16:12 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 19:16:12 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3823 >/dev/null 2>/dev/null
selfserv with PID 3823 found at Tue Nov 27 19:16:12 EST 2012
selfserv with PID 3823 started at Tue Nov 27 19:16:12 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:12 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:16:13 EST 2012
ssl.sh: #6026: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3823 at Tue Nov 27 19:16:13 EST 2012
kill -USR1 3823
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3823 killed at Tue Nov 27 19:16:13 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:16:13 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3899 >/dev/null 2>/dev/null
selfserv with PID 3899 found at Tue Nov 27 19:16:13 EST 2012
selfserv with PID 3899 started at Tue Nov 27 19:16:13 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:13 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:16:13 EST 2012
ssl.sh: #6027: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3899 at Tue Nov 27 19:16:13 EST 2012
kill -USR1 3899
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3899 killed at Tue Nov 27 19:16:13 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 19:16:13 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 3975 >/dev/null 2>/dev/null
selfserv with PID 3975 found at Tue Nov 27 19:16:13 EST 2012
selfserv with PID 3975 started at Tue Nov 27 19:16:13 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:13 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:16:13 EST 2012
ssl.sh: #6028: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 3975 at Tue Nov 27 19:16:13 EST 2012
kill -USR1 3975
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 3975 killed at Tue Nov 27 19:16:13 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:16:13 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4051 >/dev/null 2>/dev/null
selfserv with PID 4051 found at Tue Nov 27 19:16:13 EST 2012
selfserv with PID 4051 started at Tue Nov 27 19:16:13 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:13 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:16:13 EST 2012
ssl.sh: #6029: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4051 at Tue Nov 27 19:16:14 EST 2012
kill -USR1 4051
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4051 killed at Tue Nov 27 19:16:14 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:16:14 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4156 >/dev/null 2>/dev/null
selfserv with PID 4156 found at Tue Nov 27 19:16:14 EST 2012
selfserv with PID 4156 started at Tue Nov 27 19:16:14 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:14 EST 2012
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:16:14 EST 2012
ssl.sh: #6030: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4156 at Tue Nov 27 19:16:14 EST 2012
kill -USR1 4156
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4156 killed at Tue Nov 27 19:16:14 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:16:14 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4231 >/dev/null 2>/dev/null
selfserv with PID 4231 found at Tue Nov 27 19:16:14 EST 2012
selfserv with PID 4231 started at Tue Nov 27 19:16:14 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:14 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:16:15 EST 2012
ssl.sh: #6031: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4231 at Tue Nov 27 19:16:15 EST 2012
kill -USR1 4231
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4231 killed at Tue Nov 27 19:16:15 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:16:15 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4307 >/dev/null 2>/dev/null
selfserv with PID 4307 found at Tue Nov 27 19:16:15 EST 2012
selfserv with PID 4307 started at Tue Nov 27 19:16:15 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:15 EST 2012
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:16:16 EST 2012
ssl.sh: #6032: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4307 at Tue Nov 27 19:16:16 EST 2012
kill -USR1 4307
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4307 killed at Tue Nov 27 19:16:16 EST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:16:16 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4383 >/dev/null 2>/dev/null
selfserv with PID 4383 found at Tue Nov 27 19:16:16 EST 2012
selfserv with PID 4383 started at Tue Nov 27 19:16:16 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:16 EST 2012
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCertChain_Add: (PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: (PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
PKIX_PL_HashTable_Add for CertChain skipped: entry existed
PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:16:16 EST 2012
ssl.sh: #6033: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4383 at Tue Nov 27 19:16:16 EST 2012
kill -USR1 4383
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4383 killed at Tue Nov 27 19:16:16 EST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:16:16 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4458 >/dev/null 2>/dev/null
selfserv with PID 4458 found at Tue Nov 27 19:16:16 EST 2012
selfserv with PID 4458 started at Tue Nov 27 19:16:16 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:16 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:16:17 EST 2012
ssl.sh: #6034: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4458 at Tue Nov 27 19:16:17 EST 2012
kill -USR1 4458
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4458 killed at Tue Nov 27 19:16:17 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 19:16:17 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4534 >/dev/null 2>/dev/null
selfserv with PID 4534 found at Tue Nov 27 19:16:17 EST 2012
selfserv with PID 4534 started at Tue Nov 27 19:16:17 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:17 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:16:17 EST 2012
ssl.sh: #6035: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4534 at Tue Nov 27 19:16:17 EST 2012
kill -USR1 4534
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4534 killed at Tue Nov 27 19:16:17 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:16:17 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4631 >/dev/null 2>/dev/null
selfserv with PID 4631 found at Tue Nov 27 19:16:17 EST 2012
selfserv with PID 4631 started at Tue Nov 27 19:16:17 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:17 EST 2012
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:16:18 EST 2012
ssl.sh: #6036: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4631 at Tue Nov 27 19:16:18 EST 2012
kill -USR1 4631
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4631 killed at Tue Nov 27 19:16:18 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 19:16:18 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4706 >/dev/null 2>/dev/null
selfserv with PID 4706 found at Tue Nov 27 19:16:18 EST 2012
selfserv with PID 4706 started at Tue Nov 27 19:16:18 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:18 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:16:18 EST 2012
ssl.sh: #6037: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4706 at Tue Nov 27 19:16:18 EST 2012
kill -USR1 4706
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4706 killed at Tue Nov 27 19:16:18 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:16:18 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4782 >/dev/null 2>/dev/null
selfserv with PID 4782 found at Tue Nov 27 19:16:18 EST 2012
selfserv with PID 4782 started at Tue Nov 27 19:16:18 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:18 EST 2012
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: (pkix_CacheCertChain_Add: (PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:16:19 EST 2012
ssl.sh: #6038: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4782 at Tue Nov 27 19:16:19 EST 2012
kill -USR1 4782
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4782 killed at Tue Nov 27 19:16:19 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:16:19 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4857 >/dev/null 2>/dev/null
selfserv with PID 4857 found at Tue Nov 27 19:16:19 EST 2012
selfserv with PID 4857 started at Tue Nov 27 19:16:19 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:19 EST 2012
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: (PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCertChain_Add: (PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
(pkix_CacheCertChain_Add: (pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCertChain_Add: strsclnt: -- SSL: Server Certificate Validated.
PKIX_PL_HashTable_Add for CertChain skipped: entry existed
PKIX_PL_HashTable_Add for CertChain skipped: entry existed
PKIX_PL_HashTable_Add for CertChain skipped: entry existed
(PKIX_PL_Cert_VerifySignature: PKIX_PL_HashTable_Add skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
(pkix_CacheCertChain_Add: PKIX_PL_HashTable_Add for CertChain skipped: entry existed
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:16:19 EST 2012
ssl.sh: #6039: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4857 at Tue Nov 27 19:16:19 EST 2012
kill -USR1 4857
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4857 killed at Tue Nov 27 19:16:19 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 19:16:19 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4932 >/dev/null 2>/dev/null
selfserv with PID 4932 found at Tue Nov 27 19:16:19 EST 2012
selfserv with PID 4932 started at Tue Nov 27 19:16:19 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:19 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:16:19 EST 2012
ssl.sh: #6040: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 4932 at Tue Nov 27 19:16:19 EST 2012
kill -USR1 4932
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4932 killed at Tue Nov 27 19:16:19 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:16:19 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:16:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5009 >/dev/null 2>/dev/null
selfserv with PID 5009 found at Tue Nov 27 19:16:19 EST 2012
selfserv with PID 5009 started at Tue Nov 27 19:16:19 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:16:19 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:16:20 EST 2012
ssl.sh: #6041: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 5009 at Tue Nov 27 19:16:20 EST 2012
kill -USR1 5009
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5009 killed at Tue Nov 27 19:16:20 EST 2012
TIMESTAMP ssl END: Tue Nov 27 19:16:20 EST 2012
Running tests for ocsp
TIMESTAMP ocsp BEGIN: Tue Nov 27 19:16:20 EST 2012
ocsp.sh: OCSP tests ===============================
TIMESTAMP ocsp END: Tue Nov 27 19:16:20 EST 2012
Running tests for pkits
TIMESTAMP pkits BEGIN: Tue Nov 27 19:16:20 EST 2012
pkits.sh Start of logfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/pkits.log
HOSTDIR /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix
PKITSDIR /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits
PKITSdb /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb
PKITSbkp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSbkp
PKITS_DATA /home/tinderbox/pkits/data/
certs /home/tinderbox/pkits/data//certs
crls /home/tinderbox/pkits/data//crls

***************************************************************
NIST PKITS Section 4.1: Signature Verification
***************************************************************

--------------------------------------------------------------------
Test case Valid Signatures Test1

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidCertificatePathTest1EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is good!
pkits.sh: #6042: Valid Signatures Test1 - PASSED
pkits.sh SUCCESS: Valid Signatures Test1 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid CA Signature Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n BadSignedCACert -i /home/tinderbox/pkits/data//certs/BadSignedCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadSignedCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidCASignatureTest2EE.crt /home/tinderbox/pkits/data//certs/BadSignedCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. TrustAnchorRootCertificate [Certificate Authority]:
  ERROR -8182: Peer's certificate has an invalid signature.
pkits.sh: #6043: Invalid CA Signature Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid CA Signature Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid EE Signature Test3

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidEESignatureTest3EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. TrustAnchorRootCertificate [Certificate Authority]:
  ERROR -8182: Peer's certificate has an invalid signature.
pkits.sh: #6044: Invalid EE Signature Test3 (2)  - PASSED
pkits.sh SUCCESS: Invalid EE Signature Test3 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DSA Signatures Test4

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n DSACACert -i /home/tinderbox/pkits/data//certs/DSACACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/DSACACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDSASignaturesTest4EE.crt /home/tinderbox/pkits/data//certs/DSACACert.crt
Chain is good!
pkits.sh: #6045: Valid DSA Signatures Test4 - PASSED
pkits.sh SUCCESS: Valid DSA Signatures Test4 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid DSA Parameter Inheritance Test5

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n DSACACert -i /home/tinderbox/pkits/data//certs/DSACACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/DSACACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n DSAParametersInheritedCACert -i /home/tinderbox/pkits/data//certs/DSAParametersInheritedCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/DSAParametersInheritedCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDSAParameterInheritanceTest5EE.crt /home/tinderbox/pkits/data//certs/DSAParametersInheritedCACert.crt /home/tinderbox/pkits/data//certs/DSACACert.crt
Chain is good!
pkits.sh: #6046: Valid DSA Parameter Inheritance Test5 - PASSED
pkits.sh SUCCESS: Valid DSA Parameter Inheritance Test5 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DSA Signature Test6

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n DSACACert -i /home/tinderbox/pkits/data//certs/DSACACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/DSACACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDSASignatureTest6EE.crt /home/tinderbox/pkits/data//certs/DSACACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. TrustAnchorRootCertificate [Certificate Authority]:
  ERROR -8182: Peer's certificate has an invalid signature.
pkits.sh: #6047: Invalid DSA Signature Test6 (2)  - PASSED
pkits.sh SUCCESS: Invalid DSA Signature Test6 returned as expected 2
Restore DB

***************************************************************
NIST PKITS Section 4.2: Validity Periods
***************************************************************

--------------------------------------------------------------------
Test case Invalid CA notBefore Date Test1

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n BadnotBeforeDateCACert -i /home/tinderbox/pkits/data//certs/BadnotBeforeDateCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadnotBeforeDateCACRL.crl
crlutil: unable to import CRL: The CRL for the certificate's issuer has an invalid signature.
pkits.sh: #6048: Invalid CA notBefore Date Test1 (1)  - PASSED
pkits.sh SUCCESS: Invalid CA notBefore Date Test1 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Invalid EE notBefore Date Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidEEnotBeforeDateTest2EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid EE notBefore Date EE Certificate Test2,O=Test Certificates 2011,C=US :
  ERROR -8181: Peer's Certificate has expired.
pkits.sh: #6049: Invalid EE notBefore Date Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid EE notBefore Date Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid pre2000 UTC notBefore Date Test3

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/Validpre2000UTCnotBeforeDateTest3EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is good!
pkits.sh: #6050: Valid pre2000 UTC notBefore Date Test3 - PASSED
pkits.sh SUCCESS: Valid pre2000 UTC notBefore Date Test3 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid GeneralizedTime notBefore Date Test4

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidGeneralizedTimenotBeforeDateTest4EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is good!
pkits.sh: #6051: Valid GeneralizedTime notBefore Date Test4 - PASSED
pkits.sh SUCCESS: Valid GeneralizedTime notBefore Date Test4 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid CA notAfter Date Test5

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n BadnotAfterDateCACert -i /home/tinderbox/pkits/data//certs/BadnotAfterDateCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadnotAfterDateCACRL.crl
crlutil: unable to import CRL: The CRL for the certificate's issuer has an invalid signature.
pkits.sh: #6052: Invalid CA notAfter Date Test5 (1)  - PASSED
pkits.sh SUCCESS: Invalid CA notAfter Date Test5 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Invalid EE notAfter Date Test6

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidEEnotAfterDateTest6EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid EE notAfter Date EE Certificate Test6,O=Test Certificates 2011,C=US :
  ERROR -8181: Peer's Certificate has expired.
pkits.sh: #6053: Invalid EE notAfter Date Test6 (2)  - PASSED
pkits.sh SUCCESS: Invalid EE notAfter Date Test6 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid pre2000 UTC EE notAfter Date Test7

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/Invalidpre2000UTCEEnotAfterDateTest7EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid pre2000 UTC EE notAfter Date EE Certificate Test7,O=Test Certificates 2011,C=US :
  ERROR -8181: Peer's Certificate has expired.
pkits.sh: #6054: Invalid pre2000 UTC EE notAfter Date Test7 (2)  - PASSED
pkits.sh SUCCESS: Invalid pre2000 UTC EE notAfter Date Test7 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case ValidGeneralizedTime notAfter Date Test8

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidGeneralizedTimenotAfterDateTest8EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is good!
pkits.sh: #6055: ValidGeneralizedTime notAfter Date Test8 - PASSED
pkits.sh SUCCESS: ValidGeneralizedTime notAfter Date Test8 returned as expected 0
Restore DB

***************************************************************
NIST PKITS Section 4.3: Verifying NameChaining
***************************************************************

--------------------------------------------------------------------
Test case Invalid Name Chaining EE Test1

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidNameChainingTest1EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Name Chaining EE Certificate Test1,O=Test Certificates 2011,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Good CA Root,O=Test Certificates 2011,C=US
pkits.sh: #6056: Invalid Name Chaining EE Test1 (2)  - PASSED
pkits.sh SUCCESS: Invalid Name Chaining EE Test1 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid Name Chaining Order Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n NameOrderingCACert -i /home/tinderbox/pkits/data//certs/NameOrderingCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/NameOrderCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidNameChainingOrderTest2EE.crt /home/tinderbox/pkits/data//certs/NameOrderingCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=Invalid Name Chaining Order EE Certificate Test2,O=Test Certificates 2011,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Name Ordering CA,OU=Organizational Unit Name 1,OU=Organizational Unit Name 2,O=Test Certificates 2011,C=US
pkits.sh: #6057: Invalid Name Chaining Order Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid Name Chaining Order Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid Name Chaining UIDs Test6

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n UIDCACert -i /home/tinderbox/pkits/data//certs/UIDCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UIDCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidNameUIDsTest6EE.crt /home/tinderbox/pkits/data//certs/UIDCACert.crt
Chain is good!
pkits.sh: #6058: Valid Name Chaining UIDs Test6 - PASSED
pkits.sh SUCCESS: Valid Name Chaining UIDs Test6 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid RFC3280 Mandatory Attribute Types Test7

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n RFC3280MandatoryAttributeTypesCACert -i /home/tinderbox/pkits/data//certs/RFC3280MandatoryAttributeTypesCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/RFC3280MandatoryAttributeTypesCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC3280MandatoryAttributeTypesTest7EE.crt /home/tinderbox/pkits/data//certs/RFC3280MandatoryAttributeTypesCACert.crt
Chain is good!
pkits.sh: #6059: Valid RFC3280 Mandatory Attribute Types Test7 - PASSED
pkits.sh SUCCESS: Valid RFC3280 Mandatory Attribute Types Test7 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid RFC3280 Optional Attribute Types Test8

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n RFC3280OptionalAttributeTypesCACert -i /home/tinderbox/pkits/data//certs/RFC3280OptionalAttributeTypesCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/RFC3280OptionalAttributeTypesCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC3280OptionalAttributeTypesTest8EE.crt /home/tinderbox/pkits/data//certs/RFC3280OptionalAttributeTypesCACert.crt
Chain is good!
pkits.sh: #6060: Valid RFC3280 Optional Attribute Types Test8 - PASSED
pkits.sh SUCCESS: Valid RFC3280 Optional Attribute Types Test8 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid UTF8String Encoded Names Test9

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n UTF8StringEncodedNamesCACert -i /home/tinderbox/pkits/data//certs/UTF8StringEncodedNamesCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UTF8StringEncodedNamesCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidUTF8StringEncodedNamesTest9EE.crt /home/tinderbox/pkits/data//certs/UTF8StringEncodedNamesCACert.crt
Chain is good!
pkits.sh: #6061: Valid UTF8String Encoded Names Test9 - PASSED
pkits.sh SUCCESS: Valid UTF8String Encoded Names Test9 returned as expected 0
Restore DB

***************************************************************
NIST PKITS Section 4.4: Basic Certificate Revocation Tests
***************************************************************

--------------------------------------------------------------------
Test case Invalid Revoked CA Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n RevokedsubCACert -i /home/tinderbox/pkits/data//certs/RevokedsubCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/RevokedsubCACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRevokedCATest2EE.crt /home/tinderbox/pkits/data//certs/RevokedsubCACert.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. TrustAnchorRootCertificate [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
pkits.sh: #6062: Invalid Revoked CA Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid Revoked CA Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid Revoked EE Test3

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n GoodCACert -i /home/tinderbox/pkits/data//certs/GoodCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GoodCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRevokedEETest3EE.crt /home/tinderbox/pkits/data//certs/GoodCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. TrustAnchorRootCertificate [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
pkits.sh: #6063: Invalid Revoked EE Test3 (2)  - PASSED
pkits.sh SUCCESS: Invalid Revoked EE Test3 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid Bad CRL Signature Test4

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n BadCRLSignatureCACert -i /home/tinderbox/pkits/data//certs/BadCRLSignatureCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadCRLSignatureCACRL.crl
crlutil: unable to import CRL: The CRL for the certificate's issuer has an invalid signature.
pkits.sh: #6064: Invalid Bad CRL Signature Test4 (1)  - PASSED
pkits.sh SUCCESS: Invalid Bad CRL Signature Test4 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Invalid Bad CRL Issuer Name Test5

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n BadCRLIssuerNameCACert -i /home/tinderbox/pkits/data//certs/BadCRLIssuerNameCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/BadCRLIssuerNameCACRL.crl
crlutil: unable to import CRL: Peer's Certificate issuer is not recognized.
pkits.sh: #6065: Invalid Bad CRL Issuer Name Test5 (1)  - PASSED
pkits.sh SUCCESS: Invalid Bad CRL Issuer Name Test5 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Valid Two CRLs Test7

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n TwoCRLsCACert -i /home/tinderbox/pkits/data//certs/TwoCRLsCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/TwoCRLsCAGoodCRL.crl
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/TwoCRLsCABadCRL.crl
crlutil: unable to import CRL: Peer's Certificate issuer is not recognized.
pkits.sh: #6066: Valid Two CRLs Test7 (1)  - PASSED
pkits.sh SUCCESS: Valid Two CRLs Test7 returned as expected 1
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidTwoCRLsTest7EE.crt /home/tinderbox/pkits/data//certs/TwoCRLsCACert.crt
Chain is good!
pkits.sh: #6067: Valid Two CRLs Test7 - PASSED
pkits.sh SUCCESS: Valid Two CRLs Test7 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid Unknown CRL Entry Extension Test8

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n UnknownCRLEntryExtensionCACert -i /home/tinderbox/pkits/data//certs/UnknownCRLEntryExtensionCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UnknownCRLEntryExtensionCACRL.crl
crlutil: unable to import CRL: Issuer's V2 Certificate Revocation List has an unknown critical extension.
pkits.sh: #6068: Invalid Unknown CRL Entry Extension Test8 (1)  - PASSED
pkits.sh SUCCESS: Invalid Unknown CRL Entry Extension Test8 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Invalid Unknown CRL Extension Test9

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n UnknownCRLExtensionCACert -i /home/tinderbox/pkits/data//certs/UnknownCRLExtensionCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UnknownCRLExtensionCACRL.crl
crlutil: unable to import CRL: Issuer's V2 Certificate Revocation List has an unknown critical extension.
pkits.sh: #6069: Invalid Unknown CRL Extension Test9 (1)  - PASSED
pkits.sh SUCCESS: Invalid Unknown CRL Extension Test9 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Invalid Unknown CRL Extension Test10

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n UnknownCRLExtensionCACert -i /home/tinderbox/pkits/data//certs/UnknownCRLExtensionCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/UnknownCRLExtensionCACRL.crl
crlutil: unable to import CRL: Issuer's V2 Certificate Revocation List has an unknown critical extension.
pkits.sh: #6070: Invalid Unknown CRL Extension Test10 (1)  - PASSED
pkits.sh SUCCESS: Invalid Unknown CRL Extension Test10 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Valid GeneralizedTime CRL nextUpdate Test13

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n GeneralizedTimeCRLnextUpdateCACert -i /home/tinderbox/pkits/data//certs/GeneralizedTimeCRLnextUpdateCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/GeneralizedTimeCRLnextUpdateCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidGeneralizedTimeCRLnextUpdateTest13EE.crt /home/tinderbox/pkits/data//certs/GeneralizedTimeCRLnextUpdateCACert.crt
Chain is good!
pkits.sh: #6071: Valid GeneralizedTime CRL nextUpdate Test13 - PASSED
pkits.sh SUCCESS: Valid GeneralizedTime CRL nextUpdate Test13 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid Negative Serial Number Test14

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n NegativeSerialNumberCACert -i /home/tinderbox/pkits/data//certs/NegativeSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/NegativeSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidNegativeSerialNumberTest14EE.crt /home/tinderbox/pkits/data//certs/NegativeSerialNumberCACert.crt
Chain is good!
pkits.sh: #6072: Valid Negative Serial Number Test14 - PASSED
pkits.sh SUCCESS: Valid Negative Serial Number Test14 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid Negative Serial Number Test15

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n NegativeSerialNumberCACert -i /home/tinderbox/pkits/data//certs/NegativeSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/NegativeSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidNegativeSerialNumberTest15EE.crt /home/tinderbox/pkits/data//certs/NegativeSerialNumberCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. TrustAnchorRootCertificate [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
pkits.sh: #6073: Invalid Negative Serial Number Test15 (2)  - PASSED
pkits.sh SUCCESS: Invalid Negative Serial Number Test15 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid Long Serial Number Test16

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n LongSerialNumberCACert -i /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/LongSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidLongSerialNumberTest16EE.crt /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
Chain is good!
pkits.sh: #6074: Valid Long Serial Number Test16 - PASSED
pkits.sh SUCCESS: Valid Long Serial Number Test16 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid Long Serial Number Test17

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n LongSerialNumberCACert -i /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/LongSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidLongSerialNumberTest17EE.crt /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
Chain is good!
pkits.sh: #6075: Valid Long Serial Number Test17 - PASSED
pkits.sh SUCCESS: Valid Long Serial Number Test17 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid Long Serial Number Test18

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n LongSerialNumberCACert -i /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/LongSerialNumberCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidLongSerialNumberTest18EE.crt /home/tinderbox/pkits/data//certs/LongSerialNumberCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. TrustAnchorRootCertificate [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
pkits.sh: #6076: Invalid Long Serial Number Test18 (2)  - PASSED
pkits.sh SUCCESS: Invalid Long Serial Number Test18 returned as expected 2
Restore DB

***************************************************************
NIST PKITS Section 4.5: Self-Issued Certificates
***************************************************************

***************************************************************
NIST PKITS Section 4.6: Verifying Basic Constraints
***************************************************************

--------------------------------------------------------------------
Test case Invalid Missing basicConstraints Test1

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n MissingbasicConstraintsCACert -i /home/tinderbox/pkits/data//certs/MissingbasicConstraintsCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/MissingbasicConstraintsCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidMissingbasicConstraintsTest1EE.crt /home/tinderbox/pkits/data//certs/MissingbasicConstraintsCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. MissingbasicConstraintsCACert [Certificate Authority]:
  ERROR -8156: Issuer certificate is invalid.
pkits.sh: #6077: Invalid Missing basicConstraints Test1 (2)  - PASSED
pkits.sh SUCCESS: Invalid Missing basicConstraints Test1 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid cA False Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n basicConstraintsCriticalcAFalseCACert -i /home/tinderbox/pkits/data//certs/basicConstraintsCriticalcAFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/basicConstraintsCriticalcAFalseCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidcAFalseTest2EE.crt /home/tinderbox/pkits/data//certs/basicConstraintsCriticalcAFalseCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. basicConstraintsCriticalcAFalseCACert [Certificate Authority]:
  ERROR -8156: Issuer certificate is invalid.
pkits.sh: #6078: Invalid cA False Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid cA False Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid cA False Test3

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n basicConstraintsNotCriticalcAFalseCACert -i /home/tinderbox/pkits/data//certs/basicConstraintsNotCriticalcAFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/basicConstraintsNotCriticalcAFalseCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidcAFalseTest3EE.crt /home/tinderbox/pkits/data//certs/basicConstraintsNotCriticalcAFalseCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. basicConstraintsNotCriticalcAFalseCACert [Certificate Authority]:
  ERROR -8156: Issuer certificate is invalid.
pkits.sh: #6079: Invalid cA False Test3 (2)  - PASSED
pkits.sh SUCCESS: Invalid cA False Test3 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid basicConstraints Not Critical Test4

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n basicConstraintsNotCriticalCACert -i /home/tinderbox/pkits/data//certs/basicConstraintsNotCriticalCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/basicConstraintsNotCriticalCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidbasicConstraintsNotCriticalTest4EE.crt /home/tinderbox/pkits/data//certs/basicConstraintsNotCriticalCACert.crt
Chain is good!
pkits.sh: #6080: Valid basicConstraints Not Critical Test4 - PASSED
pkits.sh SUCCESS: Valid basicConstraints Not Critical Test4 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test5

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint0subCACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0subCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0subCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest5EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0subCACert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. pathLenConstraint0CACert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #6081: Invalid pathLenConstraint Test5 (2)  - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test5 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test6

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint0subCACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0subCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0subCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest6EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0subCACert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. pathLenConstraint0CACert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #6082: Invalid pathLenConstraint Test6 (2)  - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test6 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid pathLenConstraint Test7

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidpathLenConstraintTest7EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is good!
pkits.sh: #6083: Valid pathLenConstraint Test7 - PASSED
pkits.sh SUCCESS: Valid pathLenConstraint Test7 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid pathLenConstraint test8

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidpathLenConstraintTest8EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is good!
pkits.sh: #6084: Valid pathLenConstraint test8 - PASSED
pkits.sh SUCCESS: Valid pathLenConstraint test8 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test9

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA0Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA0Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA0CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA00Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA00Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA00CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest9EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA00Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA0Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. pathLenConstraint6subCA0Cert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #6085: Invalid pathLenConstraint Test9 (2)  - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test9 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test10

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA0Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA0Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA0CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA00Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA00Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA00CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest10EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA00Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA0Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. pathLenConstraint6subCA0Cert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #6086: Invalid pathLenConstraint Test10 (2)  - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test10 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid pathLenConstraint Test11

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA1Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA1CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA11Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA11Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA11CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubsubCA11XCert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA11XCert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubsubCA11XCRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest11EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA11XCert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA11Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA1Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. pathLenConstraint6subCA1Cert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #6087: Invalid pathLenConstraint Test11 (2)  - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint Test11 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid pathLenConstraint test12

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA1Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA1CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA11Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA11Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA11CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubsubCA11XCert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA11XCert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubsubCA11XCRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidpathLenConstraintTest12EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA11XCert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA11Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA1Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. pathLenConstraint6subCA1Cert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #6088: Invalid pathLenConstraint test12 (2)  - PASSED
pkits.sh SUCCESS: Invalid pathLenConstraint test12 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid pathLenConstraint Test13

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA4Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA4Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA4CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA41Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA41Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA41CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubsubCA41XCert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA41XCert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubsubCA41XCRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidpathLenConstraintTest13EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA41XCert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA41Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA4Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is good!
pkits.sh: #6089: Valid pathLenConstraint Test13 - PASSED
pkits.sh SUCCESS: Valid pathLenConstraint Test13 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid pathLenConstraint Test14

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subCA4Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA4Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subCA4CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubCA41Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA41Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubCA41CRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint6subsubsubCA41XCert -i /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA41XCert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint6subsubsubCA41XCRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidpathLenConstraintTest14EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubsubCA41XCert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subsubCA41Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6subCA4Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint6CACert.crt
Chain is good!
pkits.sh: #6090: Valid pathLenConstraint Test14 - PASSED
pkits.sh SUCCESS: Valid pathLenConstraint Test14 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid Self-Issued pathLenConstraint Test16

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint0CACert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n pathLenConstraint0subCA2Cert -i /home/tinderbox/pkits/data//certs/pathLenConstraint0subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/pathLenConstraint0subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidSelfIssuedpathLenConstraintTest16EE.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0subCA2Cert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0SelfIssuedCACert.crt /home/tinderbox/pkits/data//certs/pathLenConstraint0CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. pathLenConstraint0CACert [Certificate Authority]:
  ERROR -8155: Certificate path length constraint is invalid.
CERT 3. CN=pathLenConstraint0 CA,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8157: Certificate extension not found.
  ERROR -8155: Certificate path length constraint is invalid.
pkits.sh: #6091: Invalid Self-Issued pathLenConstraint Test16 (4)  - PASSED
pkits.sh SUCCESS: Invalid Self-Issued pathLenConstraint Test16 returned as expected 4
Restore DB

***************************************************************
NIST PKITS Section 4.7: Key Usage
***************************************************************

--------------------------------------------------------------------
Test case Invalid keyUsage Critical keyCertSign False Test1

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n keyUsageCriticalkeyCertSignFalseCACert -i /home/tinderbox/pkits/data//certs/keyUsageCriticalkeyCertSignFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageCriticalkeyCertSignFalseCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidkeyUsageCriticalkeyCertSignFalseTest1EE.crt /home/tinderbox/pkits/data//certs/keyUsageCriticalkeyCertSignFalseCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. keyUsageCriticalkeyCertSignFalseCACert [Certificate Authority]:
  ERROR -8102: Certificate key usage inadequate for attempted operation.
    CN=Trust Anchor,O=Test Certificates 2011,C=US
pkits.sh: #6092: Invalid keyUsage Critical keyCertSign False Test1 (2)  - PASSED
pkits.sh SUCCESS: Invalid keyUsage Critical keyCertSign False Test1 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid keyUsage Not Critical keyCertSign False Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n keyUsageNotCriticalkeyCertSignFalseCACert -i /home/tinderbox/pkits/data//certs/keyUsageNotCriticalkeyCertSignFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageNotCriticalkeyCertSignFalseCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE.crt /home/tinderbox/pkits/data//certs/keyUsageNotCriticalkeyCertSignFalseCACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. keyUsageNotCriticalkeyCertSignFalseCACert [Certificate Authority]:
  ERROR -8102: Certificate key usage inadequate for attempted operation.
    CN=Trust Anchor,O=Test Certificates 2011,C=US
pkits.sh: #6093: Invalid keyUsage Not Critical keyCertSign False Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid keyUsage Not Critical keyCertSign False Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid keyUsage Not Critical Test3

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n keyUsageNotCriticalCACert -i /home/tinderbox/pkits/data//certs/keyUsageNotCriticalCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageNotCriticalCACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidkeyUsageNotCriticalTest3EE.crt /home/tinderbox/pkits/data//certs/keyUsageNotCriticalCACert.crt
Chain is good!
pkits.sh: #6094: Valid keyUsage Not Critical Test3 - PASSED
pkits.sh SUCCESS: Valid keyUsage Not Critical Test3 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid keyUsage Critical cRLSign False Test4

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n keyUsageCriticalcRLSignFalseCACert -i /home/tinderbox/pkits/data//certs/keyUsageCriticalcRLSignFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageCriticalcRLSignFalseCACRL.crl
crlutil: unable to import CRL: Certificate usages field is invalid.
pkits.sh: #6095: Invalid keyUsage Critical cRLSign False Test4 (1)  - PASSED
pkits.sh SUCCESS: Invalid keyUsage Critical cRLSign False Test4 returned as expected 1
Restore DB

--------------------------------------------------------------------
Test case Invalid keyUsage Not Critical cRLSign False Test5

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n keyUsageNotCriticalcRLSignFalseCACert -i /home/tinderbox/pkits/data//certs/keyUsageNotCriticalcRLSignFalseCACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/keyUsageNotCriticalcRLSignFalseCACRL.crl
crlutil: unable to import CRL: Certificate usages field is invalid.
pkits.sh: #6096: Invalid keyUsage Not Critical cRLSign False Test5 (1)  - PASSED
pkits.sh SUCCESS: Invalid keyUsage Not Critical cRLSign False Test5 returned as expected 1
Restore DB

***************************************************************
NIST PKITS Section 4.13: Name Constraints
***************************************************************

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test1

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest1EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is good!
pkits.sh: #6097: Valid DN nameConstraints Test1 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test1 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test2

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest2EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDN1CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6098: Invalid DN nameConstraints Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test2 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test3

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest3EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDN1CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6099: Invalid DN nameConstraints Test3 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test3 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test4

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest4EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is good!
pkits.sh: #6100: Valid DN nameConstraints Test4 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test4 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test5

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest5EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN2CACert.crt
Chain is good!
pkits.sh: #6101: Valid DN nameConstraints Test5 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test5 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test6

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest6EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is good!
pkits.sh: #6102: Valid DN nameConstraints Test6 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test6 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test7

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest7EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDN3CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6103: Invalid DN nameConstraints Test7 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test7 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test8

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN4CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN4CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN4CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest8EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN4CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDN4CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6104: Invalid DN nameConstraints Test8 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test8 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test9

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN4CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN4CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN4CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest9EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN4CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDN4CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6105: Invalid DN nameConstraints Test9 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test9 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test10

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN5CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN5CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN5CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest10EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN5CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDN5CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6106: Invalid DN nameConstraints Test10 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test10 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test11

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN5CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN5CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN5CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest11EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN5CACert.crt
Chain is good!
pkits.sh: #6107: Valid DN nameConstraints Test11 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test11 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test12

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest12EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA1Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDN1subCA1Cert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6108: Invalid DN nameConstraints Test12 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test12 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test13

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest13EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA2Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDN1subCA2Cert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6109: Invalid DN nameConstraints Test13 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test13 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test14

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest14EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA2Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is good!
pkits.sh: #6110: Valid DN nameConstraints Test14 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test14 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test15

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3subCA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3subCA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest15EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA1Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. nameConstraintsDN3CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6111: Invalid DN nameConstraints Test15 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test15 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test16

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3subCA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3subCA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest16EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA1Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDN3subCA1Cert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6112: Invalid DN nameConstraints Test16 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test16 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN nameConstraints Test17

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3subCA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest17EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA2Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. nameConstraintsDN3CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6113: Invalid DN nameConstraints Test17 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN nameConstraints Test17 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DN nameConstraints Test18

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN3subCA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN3subCA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNnameConstraintsTest18EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3subCA2Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN3CACert.crt
Chain is good!
pkits.sh: #6114: Valid DN nameConstraints Test18 - PASSED
pkits.sh SUCCESS: Valid DN nameConstraints Test18 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid Self-Issued DN nameConstraints Test20

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNnameConstraintsTest20EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=nameConstraints DN1 CA,O=Test Certificates 2011,C=US [Certificate Authority]:
  ERROR -8156: Issuer certificate is invalid.
  ERROR -8157: Certificate extension not found.
pkits.sh: #6115: Invalid Self-Issued DN nameConstraints Test20 (3)  - PASSED
pkits.sh SUCCESS: Invalid Self-Issued DN nameConstraints Test20 returned as expected 3
Restore DB

--------------------------------------------------------------------
Test case Valid RFC822 nameConstraints Test21

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC822nameConstraintsTest21EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA1Cert.crt
Chain is good!
pkits.sh: #6116: Valid RFC822 nameConstraints Test21 - PASSED
pkits.sh SUCCESS: Valid RFC822 nameConstraints Test21 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid RFC822 nameConstraints Test22

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA1Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA1Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA1CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRFC822nameConstraintsTest22EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA1Cert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsRFC822CA1Cert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6117: Invalid RFC822 nameConstraints Test22 (2)  - PASSED
pkits.sh SUCCESS: Invalid RFC822 nameConstraints Test22 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid RFC822 nameConstraints Test23

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC822nameConstraintsTest23EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA2Cert.crt
Chain is good!
pkits.sh: #6118: Valid RFC822 nameConstraints Test23 - PASSED
pkits.sh SUCCESS: Valid RFC822 nameConstraints Test23 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid RFC822 nameConstraints Test24

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA2Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA2Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA2CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRFC822nameConstraintsTest24EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA2Cert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsRFC822CA2Cert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6119: Invalid RFC822 nameConstraints Test24 (2)  - PASSED
pkits.sh SUCCESS: Invalid RFC822 nameConstraints Test24 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid RFC822 nameConstraints Test25

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidRFC822nameConstraintsTest25EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA3Cert.crt
Chain is good!
pkits.sh: #6120: Valid RFC822 nameConstraints Test25 - PASSED
pkits.sh SUCCESS: Valid RFC822 nameConstraints Test25 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid RFC822 nameConstraints Test26

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsRFC822CA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsRFC822CA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidRFC822nameConstraintsTest26EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsRFC822CA3Cert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsRFC822CA3Cert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6121: Invalid RFC822 nameConstraints Test26 (2)  - PASSED
pkits.sh SUCCESS: Invalid RFC822 nameConstraints Test26 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DN and RFC822 nameConstraints Test27

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNandRFC822nameConstraintsTest27EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is good!
pkits.sh: #6122: Valid DN and RFC822 nameConstraints Test27 - PASSED
pkits.sh SUCCESS: Valid DN and RFC822 nameConstraints Test27 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DN and RFC822 nameConstraints Test28

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNandRFC822nameConstraintsTest28EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDN1subCA3Cert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6123: Invalid DN and RFC822 nameConstraints Test28 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN and RFC822 nameConstraints Test28 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DN and RFC822 nameConstraints Test29

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1CACRL.crl
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDN1subCA3Cert -i /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDN1subCA3CRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNandRFC822nameConstraintsTest29EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1subCA3Cert.crt /home/tinderbox/pkits/data//certs/nameConstraintsDN1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDN1subCA3Cert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6124: Invalid DN and RFC822 nameConstraints Test29 (2)  - PASSED
pkits.sh SUCCESS: Invalid DN and RFC822 nameConstraints Test29 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DNS nameConstraints Test30

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNSnameConstraintsTest30EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
Chain is good!
pkits.sh: #6125: Valid DNS nameConstraints Test30 - PASSED
pkits.sh SUCCESS: Valid DNS nameConstraints Test30 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DNS nameConstraints Test31

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNSnameConstraintsTest31EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDNS1CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6126: Invalid DNS nameConstraints Test31 (2)  - PASSED
pkits.sh SUCCESS: Invalid DNS nameConstraints Test31 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid DNS nameConstraints Test32

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidDNSnameConstraintsTest32EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS2CACert.crt
Chain is good!
pkits.sh: #6127: Valid DNS nameConstraints Test32 - PASSED
pkits.sh SUCCESS: Valid DNS nameConstraints Test32 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid DNS nameConstraints Test33

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNSnameConstraintsTest33EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS2CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDNS2CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6128: Invalid DNS nameConstraints Test33 (2)  - PASSED
pkits.sh SUCCESS: Invalid DNS nameConstraints Test33 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid URI nameConstraints Test34

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsURI1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsURI1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsURI1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidURInameConstraintsTest34EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsURI1CACert.crt
Chain is good!
pkits.sh: #6129: Valid URI nameConstraints Test34 - PASSED
pkits.sh SUCCESS: Valid URI nameConstraints Test34 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid URI nameConstraints Test35

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsURI1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsURI1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsURI1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidURInameConstraintsTest35EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsURI1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsURI1CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6130: Invalid URI nameConstraints Test35 (2)  - PASSED
pkits.sh SUCCESS: Invalid URI nameConstraints Test35 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Valid URI nameConstraints Test36

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsURI2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsURI2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsURI2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidURInameConstraintsTest36EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsURI2CACert.crt
Chain is good!
pkits.sh: #6131: Valid URI nameConstraints Test36 - PASSED
pkits.sh SUCCESS: Valid URI nameConstraints Test36 returned as expected 0
Restore DB

--------------------------------------------------------------------
Test case Invalid URI nameConstraints Test37

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsURI2CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsURI2CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsURI2CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidURInameConstraintsTest37EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsURI2CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsURI2CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6132: Invalid URI nameConstraints Test37 (2)  - PASSED
pkits.sh SUCCESS: Invalid URI nameConstraints Test37 returned as expected 2
Restore DB

--------------------------------------------------------------------
Test case Invalid DNS nameConstraints Test38

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -A -t ",," -n nameConstraintsDNS1CACert -i /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
crlutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -I -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb/pw -i /home/tinderbox/pkits/data//crls/nameConstraintsDNS1CACRL.crl
vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidDNSnameConstraintsTest38EE.crt /home/tinderbox/pkits/data//certs/nameConstraintsDNS1CACert.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. nameConstraintsDNS1CACert [Certificate Authority]:
  ERROR -8187: security library: invalid arguments.
pkits.sh: #6133: Invalid DNS nameConstraints Test38 (2)  - PASSED
pkits.sh SUCCESS: Invalid DNS nameConstraints Test38 returned as expected 2
Restore DB

***************************************************************
NIST PKITS Section 4.16: Private Certificate Extensions
***************************************************************

--------------------------------------------------------------------
Test case Valid Unknown Not Critical Certificate Extension Test1

vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/ValidUnknownNotCriticalCertificateExtensionTest1EE.crt
Chain is good!
pkits.sh: #6134: Valid Unknown Not Critical Certificate Extension Test1 - PASSED
pkits.sh SUCCESS: Valid Unknown Not Critical Certificate Extension Test1 returned as expected 0

--------------------------------------------------------------------
Test case Invalid Unknown Critical Certificate Extension Test2

vfychain -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/pkits/PKITSdb -u 4 /home/tinderbox/pkits/data//certs/InvalidUnknownCriticalCertificateExtensionTest2EE.crt
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. TrustAnchorRootCertificate [Certificate Authority]:
  ERROR -8151: Certificate contains unknown critical extension.
pkits.sh: #6135: Invalid Unknown Critical Certificate Extension Test2 (2)  - PASSED
pkits.sh SUCCESS: Invalid Unknown Critical Certificate Extension Test2 returned as expected 2
TIMESTAMP pkits END: Tue Nov 27 19:16:28 EST 2012
Running tests for chains
TIMESTAMP chains BEGIN: Tue Nov 27 19:16:28 EST 2012
~/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/aiahttp ~/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/chains
httpserv starting at Tue Nov 27 19:16:28 EST 2012
httpserv -D -p 8553  \
         -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/aiahttp/http_pid.12297  &
trying to connect to httpserv at Tue Nov 27 19:16:28 EST 2012
tstclnt -p 8553 -h buildnss02.usersys.redhat.com -q -v
tstclnt: connecting to buildnss02.usersys.redhat.com:8553 (address=10.16.79.157)
kill -0 7053 >/dev/null 2>/dev/null
httpserv with PID 7053 found at Tue Nov 27 19:16:28 EST 2012
httpserv with PID 7053 started at Tue Nov 27 19:16:28 EST 2012
~/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/chains
chains.sh: Certificate Chains Tests ===============================
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #6136: Bridge: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191629 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6137: Bridge: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #6138: Bridge: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #6139: Bridge: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191630 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6140: Bridge: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #6141: Bridge: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #6142: Bridge: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o BridgeReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6143: Bridge: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1127191631 -7 Bridge@Army  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6144: Bridge: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #6145: Bridge: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1127191632 -7 Bridge@Navy  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6146: Bridge: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #6147: Bridge: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #6148: Bridge: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #6149: Bridge: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6150: Bridge: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserBridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1127191633   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6151: Bridge: Creating certficate UserBridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate UserBridge.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der
chains.sh: #6152: Bridge: Importing certificate UserBridge.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6153: Bridge: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Army.der to AllDB database
certutil -A -n Army  -t "" -d AllDB -f AllDB/dbpasswd -i Army.der
chains.sh: #6154: Bridge: Importing certificate Army.der to AllDB database  - PASSED
chains.sh: Importing certificate Navy.der to AllDB database
certutil -A -n Navy  -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der
chains.sh: #6155: Bridge: Importing certificate Navy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Navy
vfychain -d AllDB -pp -vv      UserBridge.der BridgeNavy.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191630 (0x432f944e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:28 2012
            Not After : Tue Nov 28 00:16:28 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c9:b1:eb:19:d2:21:f7:bb:48:af:62:79:89:46:16:97:
                    40:fe:7c:59:b1:42:a7:78:57:f9:46:0b:48:0b:ab:26:
                    d1:84:c4:7e:ea:1f:a0:e0:9e:f4:8a:22:f6:20:79:ff:
                    81:d8:12:92:1b:33:87:a5:e8:af:ec:3d:cb:cc:0a:d3:
                    0e:d1:38:c0:f4:34:d4:9d:6b:30:96:69:cc:57:09:57:
                    9d:99:ab:6a:1a:d0:a8:8b:c6:c6:bf:00:6b:e6:85:39:
                    93:f9:aa:e1:09:08:07:07:17:84:3c:b4:af:b1:91:52:
                    6e:33:ad:3e:45:5b:95:ad:a5:c0:62:81:c3:a0:2a:83
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7c:ae:11:34:64:f2:68:9f:ff:3e:4b:f0:f1:e1:46:73:
        75:bc:1d:6f:0d:6f:e8:44:a8:7a:c5:b4:14:76:62:b2:
        97:c8:66:89:aa:83:d4:c5:3b:80:b3:4e:27:f8:18:aa:
        ce:ea:6c:ee:0a:69:3c:0d:20:73:bf:79:f6:eb:f1:af:
        03:9d:e7:d6:c1:bd:b2:fd:5d:a4:1c:64:83:c0:e4:d6:
        bb:26:b6:7b:ef:57:b2:a9:f8:48:36:8b:68:0d:ed:8e:
        76:ed:b1:f4:1b:3e:99:17:7e:31:3e:9c:86:b5:33:e7:
        e0:6b:36:8d:e5:f9:b9:86:77:c8:95:34:00:b6:79:8f
    Fingerprint (MD5):
        74:4B:10:8F:53:FA:70:9F:40:67:D3:6A:15:D4:E9:E1
    Fingerprint (SHA1):
        C9:15:91:66:DE:F1:AE:F9:CB:3A:46:ED:93:D0:DF:10:2A:56:90:38

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6156: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Navy - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der BridgeArmy.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191629 (0x432f944d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:28 2012
            Not After : Tue Nov 28 00:16:28 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e1:36:54:45:4a:7b:9d:7f:5b:81:6c:64:5f:da:4b:d7:
                    4b:73:40:09:95:69:7c:71:2c:50:a3:44:cf:46:01:86:
                    c5:31:30:77:89:81:77:41:15:0a:a9:54:13:53:c3:72:
                    a2:c7:c0:30:9d:5c:16:0d:f1:7f:f2:24:b8:c7:7a:84:
                    6f:05:cc:f2:5e:f9:78:43:cb:63:9b:f7:28:c9:88:1f:
                    56:b7:ef:f7:0a:d9:7e:40:ff:a1:2f:0a:6a:69:8b:e9:
                    b1:5d:8b:96:af:da:92:10:7a:cd:fb:3e:f9:8d:d2:d1:
                    3b:dc:86:84:22:6d:43:83:a3:24:df:1c:ae:30:39:af
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        37:2b:70:30:27:07:47:ec:4c:01:69:34:1b:fe:e5:bf:
        79:60:c0:3d:fc:c5:af:ff:a7:ba:23:4e:f3:fb:2d:02:
        10:93:46:68:57:83:cb:6f:1c:fd:0a:7c:69:61:84:fb:
        ea:25:2d:ed:ee:7b:43:73:1c:85:c3:2b:2e:5a:f6:8e:
        0e:1a:73:2e:1b:3d:ca:c6:80:29:8b:94:69:d8:4a:2d:
        a0:19:d6:66:90:43:b2:d4:00:bc:fa:56:36:e7:15:ba:
        62:1f:68:1c:9f:33:39:6c:e1:f1:2e:75:67:bb:9d:dc:
        73:68:51:d2:72:3e:b8:eb:34:63:1b:1f:e7:a8:17:55
    Fingerprint (MD5):
        83:BB:B9:2C:64:2F:5B:96:CB:20:CD:B2:9E:FB:20:F6
    Fingerprint (SHA1):
        E8:82:07:9D:32:E1:42:97:26:66:83:DF:2B:C2:62:FD:77:88:42:5D

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6157: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der BridgeNavy.der  -t Army
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Navy [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #6158: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Importing certificate BridgeArmy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der
chains.sh: #6159: Bridge: Importing certificate BridgeArmy.der to AllDB database  - PASSED
chains.sh: Importing certificate BridgeNavy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der
chains.sh: #6160: Bridge: Importing certificate BridgeNavy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der  -t Army
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191629 (0x432f944d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:28 2012
            Not After : Tue Nov 28 00:16:28 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e1:36:54:45:4a:7b:9d:7f:5b:81:6c:64:5f:da:4b:d7:
                    4b:73:40:09:95:69:7c:71:2c:50:a3:44:cf:46:01:86:
                    c5:31:30:77:89:81:77:41:15:0a:a9:54:13:53:c3:72:
                    a2:c7:c0:30:9d:5c:16:0d:f1:7f:f2:24:b8:c7:7a:84:
                    6f:05:cc:f2:5e:f9:78:43:cb:63:9b:f7:28:c9:88:1f:
                    56:b7:ef:f7:0a:d9:7e:40:ff:a1:2f:0a:6a:69:8b:e9:
                    b1:5d:8b:96:af:da:92:10:7a:cd:fb:3e:f9:8d:d2:d1:
                    3b:dc:86:84:22:6d:43:83:a3:24:df:1c:ae:30:39:af
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        37:2b:70:30:27:07:47:ec:4c:01:69:34:1b:fe:e5:bf:
        79:60:c0:3d:fc:c5:af:ff:a7:ba:23:4e:f3:fb:2d:02:
        10:93:46:68:57:83:cb:6f:1c:fd:0a:7c:69:61:84:fb:
        ea:25:2d:ed:ee:7b:43:73:1c:85:c3:2b:2e:5a:f6:8e:
        0e:1a:73:2e:1b:3d:ca:c6:80:29:8b:94:69:d8:4a:2d:
        a0:19:d6:66:90:43:b2:d4:00:bc:fa:56:36:e7:15:ba:
        62:1f:68:1c:9f:33:39:6c:e1:f1:2e:75:67:bb:9d:dc:
        73:68:51:d2:72:3e:b8:eb:34:63:1b:1f:e7:a8:17:55
    Fingerprint (MD5):
        83:BB:B9:2C:64:2F:5B:96:CB:20:CD:B2:9E:FB:20:F6
    Fingerprint (SHA1):
        E8:82:07:9D:32:E1:42:97:26:66:83:DF:2B:C2:62:FD:77:88:42:5D

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6161: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Navy
vfychain -d AllDB -pp -vv      UserBridge.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191630 (0x432f944e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:28 2012
            Not After : Tue Nov 28 00:16:28 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c9:b1:eb:19:d2:21:f7:bb:48:af:62:79:89:46:16:97:
                    40:fe:7c:59:b1:42:a7:78:57:f9:46:0b:48:0b:ab:26:
                    d1:84:c4:7e:ea:1f:a0:e0:9e:f4:8a:22:f6:20:79:ff:
                    81:d8:12:92:1b:33:87:a5:e8:af:ec:3d:cb:cc:0a:d3:
                    0e:d1:38:c0:f4:34:d4:9d:6b:30:96:69:cc:57:09:57:
                    9d:99:ab:6a:1a:d0:a8:8b:c6:c6:bf:00:6b:e6:85:39:
                    93:f9:aa:e1:09:08:07:07:17:84:3c:b4:af:b1:91:52:
                    6e:33:ad:3e:45:5b:95:ad:a5:c0:62:81:c3:a0:2a:83
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7c:ae:11:34:64:f2:68:9f:ff:3e:4b:f0:f1:e1:46:73:
        75:bc:1d:6f:0d:6f:e8:44:a8:7a:c5:b4:14:76:62:b2:
        97:c8:66:89:aa:83:d4:c5:3b:80:b3:4e:27:f8:18:aa:
        ce:ea:6c:ee:0a:69:3c:0d:20:73:bf:79:f6:eb:f1:af:
        03:9d:e7:d6:c1:bd:b2:fd:5d:a4:1c:64:83:c0:e4:d6:
        bb:26:b6:7b:ef:57:b2:a9:f8:48:36:8b:68:0d:ed:8e:
        76:ed:b1:f4:1b:3e:99:17:7e:31:3e:9c:86:b5:33:e7:
        e0:6b:36:8d:e5:f9:b9:86:77:c8:95:34:00:b6:79:8f
    Fingerprint (MD5):
        74:4B:10:8F:53:FA:70:9F:40:67:D3:6A:15:D4:E9:E1
    Fingerprint (SHA1):
        C9:15:91:66:DE:F1:AE:F9:CB:3A:46:ED:93:D0:DF:10:2A:56:90:38

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6162: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Navy - PASSED
chains.sh: Creating DB ArmyOnlyDB
certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd
chains.sh: #6163: Bridge: Creating DB ArmyOnlyDB  - PASSED
chains.sh: Importing certificate Army.der to ArmyOnlyDB database
certutil -A -n Army  -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der
chains.sh: #6164: Bridge: Importing certificate Army.der to ArmyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #6165: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #6166: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der Navy.der 
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #6167: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der Navy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191630 (0x432f944e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:28 2012
            Not After : Tue Nov 28 00:16:28 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c9:b1:eb:19:d2:21:f7:bb:48:af:62:79:89:46:16:97:
                    40:fe:7c:59:b1:42:a7:78:57:f9:46:0b:48:0b:ab:26:
                    d1:84:c4:7e:ea:1f:a0:e0:9e:f4:8a:22:f6:20:79:ff:
                    81:d8:12:92:1b:33:87:a5:e8:af:ec:3d:cb:cc:0a:d3:
                    0e:d1:38:c0:f4:34:d4:9d:6b:30:96:69:cc:57:09:57:
                    9d:99:ab:6a:1a:d0:a8:8b:c6:c6:bf:00:6b:e6:85:39:
                    93:f9:aa:e1:09:08:07:07:17:84:3c:b4:af:b1:91:52:
                    6e:33:ad:3e:45:5b:95:ad:a5:c0:62:81:c3:a0:2a:83
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7c:ae:11:34:64:f2:68:9f:ff:3e:4b:f0:f1:e1:46:73:
        75:bc:1d:6f:0d:6f:e8:44:a8:7a:c5:b4:14:76:62:b2:
        97:c8:66:89:aa:83:d4:c5:3b:80:b3:4e:27:f8:18:aa:
        ce:ea:6c:ee:0a:69:3c:0d:20:73:bf:79:f6:eb:f1:af:
        03:9d:e7:d6:c1:bd:b2:fd:5d:a4:1c:64:83:c0:e4:d6:
        bb:26:b6:7b:ef:57:b2:a9:f8:48:36:8b:68:0d:ed:8e:
        76:ed:b1:f4:1b:3e:99:17:7e:31:3e:9c:86:b5:33:e7:
        e0:6b:36:8d:e5:f9:b9:86:77:c8:95:34:00:b6:79:8f
    Fingerprint (MD5):
        74:4B:10:8F:53:FA:70:9F:40:67:D3:6A:15:D4:E9:E1
    Fingerprint (SHA1):
        C9:15:91:66:DE:F1:AE:F9:CB:3A:46:ED:93:D0:DF:10:2A:56:90:38


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6168: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191630 (0x432f944e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:28 2012
            Not After : Tue Nov 28 00:16:28 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c9:b1:eb:19:d2:21:f7:bb:48:af:62:79:89:46:16:97:
                    40:fe:7c:59:b1:42:a7:78:57:f9:46:0b:48:0b:ab:26:
                    d1:84:c4:7e:ea:1f:a0:e0:9e:f4:8a:22:f6:20:79:ff:
                    81:d8:12:92:1b:33:87:a5:e8:af:ec:3d:cb:cc:0a:d3:
                    0e:d1:38:c0:f4:34:d4:9d:6b:30:96:69:cc:57:09:57:
                    9d:99:ab:6a:1a:d0:a8:8b:c6:c6:bf:00:6b:e6:85:39:
                    93:f9:aa:e1:09:08:07:07:17:84:3c:b4:af:b1:91:52:
                    6e:33:ad:3e:45:5b:95:ad:a5:c0:62:81:c3:a0:2a:83
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7c:ae:11:34:64:f2:68:9f:ff:3e:4b:f0:f1:e1:46:73:
        75:bc:1d:6f:0d:6f:e8:44:a8:7a:c5:b4:14:76:62:b2:
        97:c8:66:89:aa:83:d4:c5:3b:80:b3:4e:27:f8:18:aa:
        ce:ea:6c:ee:0a:69:3c:0d:20:73:bf:79:f6:eb:f1:af:
        03:9d:e7:d6:c1:bd:b2:fd:5d:a4:1c:64:83:c0:e4:d6:
        bb:26:b6:7b:ef:57:b2:a9:f8:48:36:8b:68:0d:ed:8e:
        76:ed:b1:f4:1b:3e:99:17:7e:31:3e:9c:86:b5:33:e7:
        e0:6b:36:8d:e5:f9:b9:86:77:c8:95:34:00:b6:79:8f
    Fingerprint (MD5):
        74:4B:10:8F:53:FA:70:9F:40:67:D3:6A:15:D4:E9:E1
    Fingerprint (SHA1):
        C9:15:91:66:DE:F1:AE:F9:CB:3A:46:ED:93:D0:DF:10:2A:56:90:38


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6169: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     -t Navy.der - PASSED
chains.sh: Creating DB NavyOnlyDB
certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd
chains.sh: #6170: Bridge: Creating DB NavyOnlyDB  - PASSED
chains.sh: Importing certificate Navy.der to NavyOnlyDB database
certutil -A -n Navy  -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der
chains.sh: #6171: Bridge: Importing certificate Navy.der to NavyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #6172: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@army [Certificate Authority]:
Email Address(es): bridge@army
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #6173: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der Army.der 
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #6174: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     -t Army.der
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der Army.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191629 (0x432f944d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:28 2012
            Not After : Tue Nov 28 00:16:28 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e1:36:54:45:4a:7b:9d:7f:5b:81:6c:64:5f:da:4b:d7:
                    4b:73:40:09:95:69:7c:71:2c:50:a3:44:cf:46:01:86:
                    c5:31:30:77:89:81:77:41:15:0a:a9:54:13:53:c3:72:
                    a2:c7:c0:30:9d:5c:16:0d:f1:7f:f2:24:b8:c7:7a:84:
                    6f:05:cc:f2:5e:f9:78:43:cb:63:9b:f7:28:c9:88:1f:
                    56:b7:ef:f7:0a:d9:7e:40:ff:a1:2f:0a:6a:69:8b:e9:
                    b1:5d:8b:96:af:da:92:10:7a:cd:fb:3e:f9:8d:d2:d1:
                    3b:dc:86:84:22:6d:43:83:a3:24:df:1c:ae:30:39:af
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        37:2b:70:30:27:07:47:ec:4c:01:69:34:1b:fe:e5:bf:
        79:60:c0:3d:fc:c5:af:ff:a7:ba:23:4e:f3:fb:2d:02:
        10:93:46:68:57:83:cb:6f:1c:fd:0a:7c:69:61:84:fb:
        ea:25:2d:ed:ee:7b:43:73:1c:85:c3:2b:2e:5a:f6:8e:
        0e:1a:73:2e:1b:3d:ca:c6:80:29:8b:94:69:d8:4a:2d:
        a0:19:d6:66:90:43:b2:d4:00:bc:fa:56:36:e7:15:ba:
        62:1f:68:1c:9f:33:39:6c:e1:f1:2e:75:67:bb:9d:dc:
        73:68:51:d2:72:3e:b8:eb:34:63:1b:1f:e7:a8:17:55
    Fingerprint (MD5):
        83:BB:B9:2C:64:2F:5B:96:CB:20:CD:B2:9E:FB:20:F6
    Fingerprint (SHA1):
        E8:82:07:9D:32:E1:42:97:26:66:83:DF:2B:C2:62:FD:77:88:42:5D


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6175: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     -t Army.der
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191629 (0x432f944d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:28 2012
            Not After : Tue Nov 28 00:16:28 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e1:36:54:45:4a:7b:9d:7f:5b:81:6c:64:5f:da:4b:d7:
                    4b:73:40:09:95:69:7c:71:2c:50:a3:44:cf:46:01:86:
                    c5:31:30:77:89:81:77:41:15:0a:a9:54:13:53:c3:72:
                    a2:c7:c0:30:9d:5c:16:0d:f1:7f:f2:24:b8:c7:7a:84:
                    6f:05:cc:f2:5e:f9:78:43:cb:63:9b:f7:28:c9:88:1f:
                    56:b7:ef:f7:0a:d9:7e:40:ff:a1:2f:0a:6a:69:8b:e9:
                    b1:5d:8b:96:af:da:92:10:7a:cd:fb:3e:f9:8d:d2:d1:
                    3b:dc:86:84:22:6d:43:83:a3:24:df:1c:ae:30:39:af
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        37:2b:70:30:27:07:47:ec:4c:01:69:34:1b:fe:e5:bf:
        79:60:c0:3d:fc:c5:af:ff:a7:ba:23:4e:f3:fb:2d:02:
        10:93:46:68:57:83:cb:6f:1c:fd:0a:7c:69:61:84:fb:
        ea:25:2d:ed:ee:7b:43:73:1c:85:c3:2b:2e:5a:f6:8e:
        0e:1a:73:2e:1b:3d:ca:c6:80:29:8b:94:69:d8:4a:2d:
        a0:19:d6:66:90:43:b2:d4:00:bc:fa:56:36:e7:15:ba:
        62:1f:68:1c:9f:33:39:6c:e1:f1:2e:75:67:bb:9d:dc:
        73:68:51:d2:72:3e:b8:eb:34:63:1b:1f:e7:a8:17:55
    Fingerprint (MD5):
        83:BB:B9:2C:64:2F:5B:96:CB:20:CD:B2:9E:FB:20:F6
    Fingerprint (SHA1):
        E8:82:07:9D:32:E1:42:97:26:66:83:DF:2B:C2:62:FD:77:88:42:5D


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6176: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     -t Army.der - PASSED
chains.sh: Creating DB Root1DB
certutil -N -d Root1DB -f Root1DB/dbpasswd
chains.sh: #6177: MegaBridge_3_2: Creating DB Root1DB  - PASSED
chains.sh: Creating Root CA Root1
certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1  -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191634 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6178: MegaBridge_3_2: Creating Root CA Root1  - PASSED
chains.sh: Exporting Root CA Root1.der
certutil -L -d Root1DB -r -n Root1 -o Root1.der
chains.sh: #6179: MegaBridge_3_2: Exporting Root CA Root1.der  - PASSED
chains.sh: Creating DB Root2DB
certutil -N -d Root2DB -f Root2DB/dbpasswd
chains.sh: #6180: MegaBridge_3_2: Creating DB Root2DB  - PASSED
chains.sh: Creating Root CA Root2
certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2  -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191635 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6181: MegaBridge_3_2: Creating Root CA Root2  - PASSED
chains.sh: Exporting Root CA Root2.der
certutil -L -d Root2DB -r -n Root2 -o Root2.der
chains.sh: #6182: MegaBridge_3_2: Exporting Root CA Root2.der  - PASSED
chains.sh: Creating DB Root3DB
certutil -N -d Root3DB -f Root3DB/dbpasswd
chains.sh: #6183: MegaBridge_3_2: Creating DB Root3DB  - PASSED
chains.sh: Creating Root CA Root3
certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3  -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191636 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6184: MegaBridge_3_2: Creating Root CA Root3  - PASSED
chains.sh: Exporting Root CA Root3.der
certutil -L -d Root3DB -r -n Root3 -o Root3.der
chains.sh: #6185: MegaBridge_3_2: Exporting Root CA Root3.der  - PASSED
chains.sh: Creating DB Root4DB
certutil -N -d Root4DB -f Root4DB/dbpasswd
chains.sh: #6186: MegaBridge_3_2: Creating DB Root4DB  - PASSED
chains.sh: Creating Root CA Root4
certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4  -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191637 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6187: MegaBridge_3_2: Creating Root CA Root4  - PASSED
chains.sh: Exporting Root CA Root4.der
certutil -L -d Root4DB -r -n Root4 -o Root4.der
chains.sh: #6188: MegaBridge_3_2: Exporting Root CA Root4.der  - PASSED
chains.sh: Creating DB Root5DB
certutil -N -d Root5DB -f Root5DB/dbpasswd
chains.sh: #6189: MegaBridge_3_2: Creating DB Root5DB  - PASSED
chains.sh: Creating Root CA Root5
certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5  -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191638 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6190: MegaBridge_3_2: Creating Root CA Root5  - PASSED
chains.sh: Exporting Root CA Root5.der
certutil -L -d Root5DB -r -n Root5 -o Root5.der
chains.sh: #6191: MegaBridge_3_2: Exporting Root CA Root5.der  - PASSED
chains.sh: Creating DB Root6DB
certutil -N -d Root6DB -f Root6DB/dbpasswd
chains.sh: #6192: MegaBridge_3_2: Creating DB Root6DB  - PASSED
chains.sh: Creating Root CA Root6
certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6  -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191639 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6193: MegaBridge_3_2: Creating Root CA Root6  - PASSED
chains.sh: Exporting Root CA Root6.der
certutil -L -d Root6DB -r -n Root6 -o Root6.der
chains.sh: #6194: MegaBridge_3_2: Exporting Root CA Root6.der  - PASSED
chains.sh: Creating DB Root7DB
certutil -N -d Root7DB -f Root7DB/dbpasswd
chains.sh: #6195: MegaBridge_3_2: Creating DB Root7DB  - PASSED
chains.sh: Creating Root CA Root7
certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7  -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191640 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6196: MegaBridge_3_2: Creating Root CA Root7  - PASSED
chains.sh: Exporting Root CA Root7.der
certutil -L -d Root7DB -r -n Root7 -o Root7.der
chains.sh: #6197: MegaBridge_3_2: Exporting Root CA Root7.der  - PASSED
chains.sh: Creating DB Root8DB
certutil -N -d Root8DB -f Root8DB/dbpasswd
chains.sh: #6198: MegaBridge_3_2: Creating DB Root8DB  - PASSED
chains.sh: Creating Root CA Root8
certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8  -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191641 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6199: MegaBridge_3_2: Creating Root CA Root8  - PASSED
chains.sh: Exporting Root CA Root8.der
certutil -L -d Root8DB -r -n Root8 -o Root8.der
chains.sh: #6200: MegaBridge_3_2: Exporting Root CA Root8.der  - PASSED
chains.sh: Creating DB Root9DB
certutil -N -d Root9DB -f Root9DB/dbpasswd
chains.sh: #6201: MegaBridge_3_2: Creating DB Root9DB  - PASSED
chains.sh: Creating Root CA Root9
certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9  -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191642 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6202: MegaBridge_3_2: Creating Root CA Root9  - PASSED
chains.sh: Exporting Root CA Root9.der
certutil -L -d Root9DB -r -n Root9 -o Root9.der
chains.sh: #6203: MegaBridge_3_2: Exporting Root CA Root9.der  - PASSED
chains.sh: Creating DB Bridge11DB
certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd
chains.sh: #6204: MegaBridge_3_2: Creating DB Bridge11DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge11Req.der
certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US"  -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o Bridge11Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6205: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der  - PASSED
chains.sh: Creating certficate Bridge11Root1.der signed by Root1
certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1127191643 -7 Bridge11@Root1  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6206: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1  - PASSED
chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der
chains.sh: #6207: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root2.der signed by Root2
certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1127191644 -7 Bridge11@Root2  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6208: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2  - PASSED
chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der
chains.sh: #6209: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root3.der signed by Root3
certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1127191645 -7 Bridge11@Root3  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6210: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3  - PASSED
chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der
chains.sh: #6211: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge11DB database
cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7
chains.sh: #6212: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database  - PASSED
chains.sh: Creating DB Bridge12DB
certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd
chains.sh: #6213: MegaBridge_3_2: Creating DB Bridge12DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge12Req.der
certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US"  -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o Bridge12Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6214: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der  - PASSED
chains.sh: Creating certficate Bridge12Root4.der signed by Root4
certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1127191646 -7 Bridge12@Root4  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6215: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4  - PASSED
chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der
chains.sh: #6216: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root5.der signed by Root5
certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1127191647 -7 Bridge12@Root5  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6217: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5  - PASSED
chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der
chains.sh: #6218: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root6.der signed by Root6
certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1127191648 -7 Bridge12@Root6  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6219: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6  - PASSED
chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der
chains.sh: #6220: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge12DB database
cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7
chains.sh: #6221: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database  - PASSED
chains.sh: Creating DB Bridge13DB
certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd
chains.sh: #6222: MegaBridge_3_2: Creating DB Bridge13DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge13Req.der
certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US"  -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o Bridge13Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6223: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der  - PASSED
chains.sh: Creating certficate Bridge13Root7.der signed by Root7
certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1127191649 -7 Bridge13@Root7  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6224: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7  - PASSED
chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der
chains.sh: #6225: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root8.der signed by Root8
certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1127191650 -7 Bridge13@Root8  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6226: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8  - PASSED
chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der
chains.sh: #6227: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root9.der signed by Root9
certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1127191651 -7 Bridge13@Root9  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6228: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9  - PASSED
chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der
chains.sh: #6229: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge13DB database
cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7
chains.sh: #6230: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database  - PASSED
chains.sh: Creating DB Bridge21DB
certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd
chains.sh: #6231: MegaBridge_3_2: Creating DB Bridge21DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge21Req.der
certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US"  -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o Bridge21Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6232: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der  - PASSED
chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11
certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1127191652 -7 Bridge21@Bridge11  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6233: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11  - PASSED
chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der
chains.sh: #6234: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12
certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1127191653 -7 Bridge21@Bridge12  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6235: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12  - PASSED
chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der
chains.sh: #6236: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13
certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1127191654 -7 Bridge21@Bridge13  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6237: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13  - PASSED
chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der
chains.sh: #6238: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge21DB database
cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7
chains.sh: #6239: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6240: MegaBridge_3_2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6241: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21
certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1127191655   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6242: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21  - PASSED
chains.sh: Importing certificate CA1Bridge21.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der
chains.sh: #6243: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #6244: MegaBridge_3_2: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6245: MegaBridge_3_2: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127191656   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6246: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #6247: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags  -d EE1DB     -t Root1.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der  -t Root1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191634 (0x432f9452)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root1 ROOT CA,O=Root1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:30 2012
            Not After : Tue Nov 28 00:16:30 2062
        Subject: "CN=Root1 ROOT CA,O=Root1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b2:8f:f7:93:b7:9d:ca:f2:a9:0d:4e:7a:06:27:0f:47:
                    e3:17:af:48:16:35:c7:04:1b:ba:4b:5f:33:ad:f7:b4:
                    c6:14:4c:2e:3e:fb:91:13:8d:47:03:f0:4b:b6:f7:35:
                    a1:f6:cf:01:e8:29:ea:79:88:d9:9e:16:b0:32:a8:7b:
                    f9:f0:36:c9:3e:93:06:ae:d2:c9:72:1c:d6:ad:3a:f7:
                    c1:33:5c:6c:10:cd:67:0c:14:85:df:8e:4f:00:0b:3a:
                    46:1c:c2:2e:18:a1:b5:e3:b1:4f:16:d6:8b:5f:20:0c:
                    8c:6c:81:dc:a2:51:39:c6:9c:29:b1:09:92:48:15:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:5d:53:da:a1:f6:fd:50:34:94:a2:b3:89:73:92:9d:
        67:a9:20:a7:c7:2a:e4:91:27:0f:1f:1a:72:51:59:22:
        3b:75:c1:98:6d:08:a2:21:e8:d6:07:39:88:d0:30:8c:
        d9:c9:bb:b7:68:7a:b6:83:74:43:08:20:6f:e5:9e:05:
        65:de:a1:68:c7:20:1b:e3:0d:b1:ca:b6:be:33:ea:de:
        ce:28:bf:f2:52:c7:f3:85:66:35:7f:e0:32:1d:93:b3:
        fb:bd:cc:31:53:cc:28:e3:fb:db:d0:c7:51:be:6a:01:
        84:ce:95:ef:88:52:5d:0c:b6:41:89:da:13:b7:51:58
    Fingerprint (MD5):
        55:E9:67:4E:DC:45:88:9F:B5:0D:D0:3A:37:45:9D:20
    Fingerprint (SHA1):
        77:19:16:EB:4A:FA:A7:3E:DB:55:07:94:E7:26:79:A0:2A:D4:91:2E


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #6248: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags  -d EE1DB     -t Root1.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags  -d EE1DB     -t Root2.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der  -t Root2.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191635 (0x432f9453)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root2 ROOT CA,O=Root2,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:30 2012
            Not After : Tue Nov 28 00:16:30 2062
        Subject: "CN=Root2 ROOT CA,O=Root2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:07:23:f8:cb:a1:ea:91:ec:e5:d2:8f:ef:5e:e7:a1:
                    e0:cd:d0:32:3b:c3:a1:65:72:f9:a4:e8:d0:00:08:d8:
                    ae:2e:11:37:89:53:33:f2:9b:2e:27:7c:d5:24:05:61:
                    32:3c:ce:f9:e0:5d:00:7d:0f:1b:57:e7:e6:bd:2b:78:
                    3a:51:75:9a:8d:ae:e2:10:e2:3b:80:99:6d:a4:d6:5f:
                    45:61:10:28:2e:b1:be:e5:d3:8e:77:7f:91:90:d1:bb:
                    05:5c:d6:0f:bb:db:c8:8d:ef:38:79:54:ec:0a:7d:52:
                    63:d2:74:62:a0:b9:d0:1d:cb:07:ce:63:a9:dc:92:0d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        25:14:1e:7c:c1:d2:79:68:f5:68:af:1d:bc:7b:b0:c5:
        07:d6:f1:4e:e0:e2:d7:d3:51:2a:ce:a6:f7:e0:cb:cd:
        6f:92:a9:53:46:e2:57:c5:c3:71:dd:07:63:31:5e:b1:
        cf:11:74:db:c2:d6:c2:a8:57:a4:38:9b:d7:5f:4f:c5:
        a2:ca:cb:a6:2f:d9:96:88:db:ad:d4:ce:23:a3:9e:94:
        74:2d:8f:2b:79:f4:b8:63:a8:f6:8f:34:07:33:d9:d0:
        68:80:ca:36:5f:48:b3:cd:0e:33:a8:31:e7:c7:50:46:
        af:80:34:cb:44:5a:71:d4:1f:3f:d2:27:5d:c2:ca:50
    Fingerprint (MD5):
        6F:01:82:8F:76:C3:67:18:10:43:83:24:3D:1F:AB:CE
    Fingerprint (SHA1):
        74:BA:11:78:A5:FF:DC:81:B8:7E:4A:09:B3:C3:C1:41:B8:9D:9E:CE


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #6249: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags  -d EE1DB     -t Root2.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags  -d EE1DB     -t Root3.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der  -t Root3.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191636 (0x432f9454)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root3 ROOT CA,O=Root3,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:31 2012
            Not After : Tue Nov 28 00:16:31 2062
        Subject: "CN=Root3 ROOT CA,O=Root3,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    df:51:f5:9c:6e:67:dc:37:f1:bb:b3:d1:b1:8d:d3:65:
                    fd:d6:38:e1:80:1e:b0:39:85:b7:d6:3f:1c:ae:2d:e2:
                    c4:12:5d:76:60:d6:a6:a4:53:6f:01:54:ea:16:9c:bd:
                    20:f1:89:88:e1:18:f2:19:4c:a2:4c:58:04:88:fe:b2:
                    a2:9f:aa:49:29:23:75:e7:25:4a:14:a0:ae:fe:7a:7f:
                    8a:2a:ab:f7:ea:05:7d:c1:a6:9c:d2:4f:4c:6e:27:15:
                    4c:3b:b2:dc:ba:a8:f8:36:74:38:1c:a7:d3:ee:9d:f8:
                    ed:65:1f:7d:4d:e8:db:8c:d5:4e:78:5c:0d:34:a3:4d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        72:76:72:7b:b4:f4:50:05:b5:21:da:de:e3:af:ca:93:
        04:f6:01:6e:8d:26:62:f8:b7:31:a2:f1:7e:96:f8:99:
        2a:0f:07:ab:2c:ba:bd:de:a0:f0:e8:fa:72:1a:3c:c9:
        3e:c3:88:12:06:48:aa:2f:83:81:62:bf:b9:4f:22:ff:
        73:74:58:5b:f0:a0:67:1d:90:cf:7f:fd:06:28:c9:c7:
        91:95:ae:82:d4:57:8a:11:f9:2c:15:aa:57:d5:b5:c7:
        c3:76:4c:56:6b:4a:ca:40:69:7f:ea:1a:44:33:22:6f:
        9e:96:e9:ae:40:86:64:fc:35:73:57:c0:35:d1:5e:18
    Fingerprint (MD5):
        2B:91:80:6F:F8:37:16:BA:35:14:A3:9A:1E:71:36:BA
    Fingerprint (SHA1):
        F7:CD:25:AB:DE:3E:55:84:10:F0:E7:92:A4:CC:8B:AA:61:BC:18:5D


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #6250: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags  -d EE1DB     -t Root3.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags  -d EE1DB     -t Root4.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der  -t Root4.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191637 (0x432f9455)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root4 ROOT CA,O=Root4,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:31 2012
            Not After : Tue Nov 28 00:16:31 2062
        Subject: "CN=Root4 ROOT CA,O=Root4,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b2:9b:53:0a:62:25:8e:19:88:2e:6d:48:6b:96:40:85:
                    f3:6c:3a:ea:8c:da:81:81:25:ed:9f:ff:c4:19:9b:ec:
                    e0:df:2c:78:85:7c:4a:a6:dd:8d:f9:6e:d0:51:f1:a0:
                    f8:88:25:42:2c:62:ea:59:59:08:23:8a:29:b2:6f:23:
                    1e:26:98:8c:4a:ce:02:f3:9a:3d:2e:69:fb:99:20:12:
                    87:f3:c9:1c:70:b6:ea:44:81:a1:f8:18:99:9a:45:73:
                    72:7f:6d:49:3d:06:59:06:70:60:73:61:27:70:ce:49:
                    f0:6d:96:ef:75:28:c2:ef:e2:83:20:b2:9a:a1:47:9b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a7:5a:0a:50:b0:95:56:60:90:2a:41:1b:85:3c:46:55:
        4e:25:96:16:21:94:ad:7f:ff:3a:d0:49:49:21:b5:f0:
        31:0c:0c:b0:f8:0f:6b:9b:ff:21:42:27:fc:29:40:d1:
        0b:9b:b4:a8:2d:c6:97:ed:72:c0:3a:f4:cb:7f:86:52:
        43:35:dd:78:56:29:26:ef:49:3b:fc:fe:11:39:93:c3:
        04:9f:c3:c8:45:f3:bd:c7:76:a9:1f:af:34:a9:4f:c7:
        21:54:49:65:09:21:00:bd:62:7b:bb:a4:5e:ae:4d:24:
        2d:ce:ab:2c:e4:52:1a:e7:ce:b7:43:e8:d4:68:1f:fd
    Fingerprint (MD5):
        21:7E:F2:D1:4A:DE:F2:36:C1:7F:81:DC:35:B8:27:00
    Fingerprint (SHA1):
        ED:24:E8:68:A0:C5:E6:DF:0D:26:1B:FD:05:C3:9A:5B:BC:44:D1:15


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #6251: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags  -d EE1DB     -t Root4.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags  -d EE1DB     -t Root5.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der  -t Root5.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191638 (0x432f9456)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root5 ROOT CA,O=Root5,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:31 2012
            Not After : Tue Nov 28 00:16:31 2062
        Subject: "CN=Root5 ROOT CA,O=Root5,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    af:c1:28:8f:4c:65:1e:6d:1a:37:b9:f2:80:c6:21:66:
                    9e:44:94:76:4a:0f:0a:01:04:2e:74:f8:51:69:d1:3a:
                    2b:f2:28:47:bc:77:51:9a:59:bb:f3:80:56:b9:aa:ce:
                    8d:82:a4:46:4f:c5:b2:7e:e9:25:e8:05:5b:1b:bd:ce:
                    53:3c:18:cd:a1:c6:f6:ad:4b:92:c4:4e:95:fe:50:25:
                    24:c4:79:8d:03:97:11:97:e2:88:a7:af:c0:0f:98:73:
                    0f:65:e9:80:9a:e3:58:73:f1:6d:bb:9a:ab:37:c1:50:
                    cf:67:40:26:b2:01:d9:82:52:79:b8:20:96:3d:6c:f1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:ef:50:64:e2:84:b8:14:7c:a5:9e:d3:d3:ab:8a:d7:
        c5:b5:e7:f2:3f:49:54:79:37:fd:ff:45:df:3d:b7:5e:
        a0:27:a5:08:5a:8b:91:7f:ff:03:3a:a2:84:26:92:78:
        95:83:46:7b:2c:9f:76:be:db:24:04:90:77:51:fa:8a:
        56:ab:ca:db:da:68:27:27:c6:1f:de:09:aa:aa:f5:48:
        06:1a:1a:38:ce:1b:85:1f:28:8e:06:3f:c2:98:55:9a:
        67:52:5f:a6:07:73:ac:0e:0a:ce:6e:81:06:8c:b0:c2:
        e9:0c:0c:52:df:68:be:e5:fc:93:01:18:66:aa:86:ea
    Fingerprint (MD5):
        FF:EC:B1:5E:F2:9E:0D:23:C5:AE:5E:BF:87:8F:E6:C6
    Fingerprint (SHA1):
        74:90:C9:5F:7C:5E:F7:07:44:AE:76:4F:AC:04:37:2E:82:84:51:45


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #6252: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags  -d EE1DB     -t Root5.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags  -d EE1DB     -t Root6.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der  -t Root6.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191639 (0x432f9457)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root6 ROOT CA,O=Root6,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:31 2012
            Not After : Tue Nov 28 00:16:31 2062
        Subject: "CN=Root6 ROOT CA,O=Root6,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c0:30:bf:f2:69:86:8b:ea:0a:2e:d2:d8:c4:33:5c:68:
                    43:33:20:ec:88:f5:95:b2:af:55:c5:dd:97:e5:66:ac:
                    85:a1:db:87:32:9d:04:77:e2:ed:58:0a:dc:61:ec:10:
                    0b:74:9f:84:15:91:2f:3f:37:dc:20:d9:32:39:85:29:
                    cd:5f:88:82:c3:2b:cf:8d:89:ce:cf:9e:70:cc:27:f3:
                    6e:c4:f2:17:85:9e:64:a3:23:0e:29:ff:ad:97:08:05:
                    19:d3:96:f9:be:64:09:8f:d5:5e:3c:8c:b6:24:25:6a:
                    48:5b:7d:4e:0c:6d:f3:03:6b:0e:96:b1:b3:8a:ea:f1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        aa:f0:ca:af:85:1b:9e:02:3a:24:b5:3c:f6:f0:6d:9d:
        97:59:4b:40:8f:63:1a:5d:8b:09:13:f5:e1:d9:1b:d7:
        f5:87:a9:5e:4a:50:a5:f0:0f:be:d4:ac:91:32:ca:b6:
        64:38:e3:72:26:87:c3:bb:4a:b1:8b:3a:ca:80:13:77:
        e5:c6:4b:f2:8d:4d:8d:42:4c:2a:61:ed:42:2d:65:77:
        32:49:7a:79:bf:1c:a4:e0:cf:a9:54:53:89:38:38:91:
        10:95:0d:bf:da:76:45:05:f9:26:22:de:e0:6e:e8:e0:
        be:e1:bf:c4:06:bc:c7:09:d7:b5:2e:53:28:08:6d:7a
    Fingerprint (MD5):
        97:9D:EB:3E:4A:95:90:43:4B:DA:4B:3D:8B:D7:CD:EF
    Fingerprint (SHA1):
        EB:87:19:26:E7:B9:D6:CA:6B:45:8D:30:C9:98:38:BB:66:CA:3D:C8


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #6253: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags  -d EE1DB     -t Root6.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags  -d EE1DB     -t Root7.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der  -t Root7.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191640 (0x432f9458)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root7 ROOT CA,O=Root7,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:32 2012
            Not After : Tue Nov 28 00:16:32 2062
        Subject: "CN=Root7 ROOT CA,O=Root7,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:c5:ca:79:36:06:b9:7f:de:10:93:1c:14:e4:79:df:
                    8a:17:f9:0e:e4:c3:2d:c7:bd:9a:74:39:0a:86:e3:44:
                    91:80:77:9b:bc:5e:63:48:7d:cd:ae:b9:a2:6b:25:26:
                    88:a4:ab:4c:1a:ff:5b:c9:df:30:79:23:f7:4a:85:c1:
                    c6:2b:d9:5c:65:e3:74:46:b5:6d:76:bb:8c:df:d8:5f:
                    d3:95:b3:15:e0:ed:cd:ec:a8:be:c4:76:86:4c:cc:9d:
                    2a:62:8e:06:5f:db:98:e4:a0:32:9e:7b:02:e9:59:d5:
                    18:31:5c:15:d7:16:be:8b:f0:55:25:6a:4c:d0:83:01
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b6:bc:e2:ef:f5:62:0d:e6:6e:2d:25:02:78:bb:11:6e:
        e8:2d:c0:00:2e:91:e7:16:60:29:9a:06:fe:a1:ff:d3:
        6f:a7:78:b2:f7:83:d4:99:ae:06:74:73:6b:25:a7:35:
        ad:8b:98:8b:fb:98:1a:f7:db:fd:dd:d4:0c:da:c0:1d:
        c2:49:19:b1:c5:14:1b:0e:9f:d4:33:87:3c:ea:7e:b3:
        b5:9f:15:61:b7:ee:7c:53:a5:f8:7f:cb:24:6e:47:18:
        86:cc:f1:f5:9f:d0:25:ec:80:7f:d5:d8:00:77:74:35:
        3d:70:63:10:b5:0c:27:05:57:22:4b:98:17:42:eb:ac
    Fingerprint (MD5):
        1E:50:17:D5:01:E7:9D:B0:03:63:E0:3E:F3:B9:CF:51
    Fingerprint (SHA1):
        28:28:81:A9:5C:B8:AE:86:FC:58:F1:20:26:EF:D4:8B:E0:C8:90:1C


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #6254: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags  -d EE1DB     -t Root7.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags  -d EE1DB     -t Root8.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der  -t Root8.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191641 (0x432f9459)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root8 ROOT CA,O=Root8,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:32 2012
            Not After : Tue Nov 28 00:16:32 2062
        Subject: "CN=Root8 ROOT CA,O=Root8,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d2:d1:43:d0:ea:81:72:08:e3:c6:fd:25:8a:b2:91:a4:
                    bd:65:7c:f1:c9:9b:79:fb:8f:1b:dd:8c:f3:2e:3d:70:
                    ba:20:6a:13:38:b3:04:07:5e:1d:84:50:b9:e1:c7:4b:
                    59:3b:82:9c:e6:96:0d:75:e4:df:1f:0d:ab:1b:75:c0:
                    0d:21:80:f3:ed:48:90:e5:4f:0d:c5:a8:48:84:f5:e0:
                    7f:c3:c9:0f:51:4c:6b:41:d5:b2:40:71:1c:6f:a2:9b:
                    f0:44:50:e7:b7:d9:fd:82:c0:eb:82:1f:03:da:96:14:
                    72:9b:9a:0f:bf:6f:36:8d:86:79:39:48:71:3e:f4:a5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        18:92:a4:03:c2:42:cc:c8:da:f5:25:3b:05:4f:22:a7:
        82:85:e2:e9:b4:42:04:f9:3e:53:fa:7a:3f:78:f9:e5:
        c2:29:9e:25:4c:f1:d4:27:4e:79:1e:73:0d:f5:5b:fc:
        8b:57:ba:a4:ad:6e:18:02:45:dc:6d:ff:02:3e:db:a2:
        87:d1:6c:ca:27:5e:e7:c7:9b:85:ed:3c:dc:dd:b6:81:
        a7:70:39:7c:9a:86:37:39:56:fc:39:8c:3f:7e:76:ad:
        d1:24:99:85:d0:8b:7b:d1:dd:17:8e:aa:4f:51:6c:cf:
        b4:b1:d0:5d:be:9f:42:23:07:7e:db:9c:8c:fa:ee:ae
    Fingerprint (MD5):
        1A:A3:2B:87:74:BB:3A:8F:96:0C:46:A4:99:2F:8E:89
    Fingerprint (SHA1):
        C5:0C:88:70:57:F0:4C:70:ED:2E:44:E6:B1:A4:19:39:B2:94:3C:2D


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #6255: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags  -d EE1DB     -t Root8.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags  -d EE1DB     -t Root9.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der  -t Root9.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191642 (0x432f945a)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root9 ROOT CA,O=Root9,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:32 2012
            Not After : Tue Nov 28 00:16:32 2062
        Subject: "CN=Root9 ROOT CA,O=Root9,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:ac:43:f4:6d:41:ea:ca:f8:f9:c5:0b:84:04:72:87:
                    9f:11:86:13:c5:7b:f3:ca:25:40:9b:07:d7:8a:d2:13:
                    01:c2:82:7c:78:d8:07:7e:7a:cf:08:14:06:24:4b:6c:
                    c0:e3:d5:e8:86:6f:8c:24:bd:c7:23:98:80:20:04:82:
                    e0:c9:27:62:25:b4:02:69:68:de:74:e4:79:17:87:e6:
                    3c:7e:ac:48:ef:a8:8c:51:33:e2:37:a8:4f:0c:23:43:
                    43:2a:f3:be:78:88:5c:8c:52:8d:4f:bd:3f:6a:d2:b0:
                    d9:70:14:56:d1:cf:43:34:f8:33:df:81:0e:16:9b:85
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        69:c1:47:44:17:89:24:82:92:25:9e:1b:ca:b0:3d:f2:
        ec:c0:70:f7:dd:5e:61:4a:6f:d5:b2:5b:62:37:e0:dc:
        ab:ef:46:57:c2:d3:e3:00:12:f2:88:5d:1e:ae:9d:be:
        86:d2:c3:a5:f2:1b:a4:e4:37:6b:9c:81:73:2b:cb:17:
        9f:4d:2b:cf:35:6f:60:13:08:55:bc:ca:32:d9:7e:44:
        84:98:d4:63:ef:af:65:90:59:17:af:58:b5:28:7d:7f:
        49:39:43:7b:7b:60:27:c1:33:2b:98:07:e5:9b:79:2c:
        1e:33:06:38:c9:cd:1d:27:66:d3:3e:fc:b2:e6:b3:25
    Fingerprint (MD5):
        D4:1B:17:FA:2A:37:8C:BC:7A:78:0E:2E:B0:A2:D7:D0
    Fingerprint (SHA1):
        4A:FF:9F:CF:C5:A2:CE:74:5E:90:03:66:EE:59:0B:50:83:33:1F:BC


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #6256: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags  -d EE1DB     -t Root9.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6257: Extension: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191657 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6258: Extension: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6259: Extension: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6260: Extension: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6261: Extension: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127191658   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6262: Extension: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #6263: Extension: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6264: Extension: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6265: Extension: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127191659   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6266: Extension: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #6267: Extension: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #6268: Extension: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6269: Extension: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1127191660   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6270: Extension: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #6271: Extension: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6272: Extension: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191657 (0x432f9469)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:36 2012
            Not After : Tue Nov 28 00:16:36 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c0:ac:f1:9d:11:43:24:a0:91:df:9a:02:24:0c:75:8f:
                    e3:cd:d6:23:c0:86:28:16:12:b0:33:b0:29:6a:d2:a8:
                    a9:c6:3d:ca:b5:b9:e2:1c:6e:1f:bb:fc:cc:37:aa:9d:
                    bf:51:c1:e0:08:8b:b4:b5:62:c0:35:8b:bf:50:02:8c:
                    7d:f8:24:ff:cc:6d:21:e1:34:03:94:8e:81:60:d6:48:
                    0a:ec:8d:0c:09:a2:31:83:29:a0:7d:47:56:34:6a:b4:
                    d0:80:0f:d2:f3:0c:ed:6a:fe:71:ea:f0:06:32:fc:e7:
                    85:b9:56:aa:ea:c9:7a:ca:8f:2b:64:95:c0:95:d6:91
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        98:87:ea:f9:c9:53:64:0b:c0:46:40:2e:7b:21:9e:ff:
        be:c8:e3:02:43:11:e9:dd:4a:53:98:77:47:72:79:9c:
        88:be:0c:f6:97:9b:bb:9d:2c:df:64:67:88:b1:c0:73:
        1c:11:e5:d9:db:80:df:2a:50:33:2c:7d:02:40:f0:ea:
        1f:d9:cd:e9:e0:35:b1:7f:5e:d4:24:62:94:43:d3:91:
        70:f2:1f:12:d6:21:13:59:e6:82:16:ec:55:a9:ae:1e:
        d3:ce:d0:7d:fb:3a:50:ab:43:f1:0e:92:09:f0:c0:47:
        0c:2f:05:09:0a:78:bf:38:70:76:66:34:47:53:ff:73
    Fingerprint (MD5):
        55:90:9D:A0:1E:52:5A:F3:0D:9A:26:BE:EF:A5:81:64
    Fingerprint (SHA1):
        CC:45:86:75:24:32:4D:2A:13:D2:8D:95:E6:D2:6E:2E:3B:24:38:A7


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6273: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6274: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191658 (0x432f946a)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:36 2012
            Not After : Tue Nov 28 00:16:36 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:37:73:35:85:56:34:24:52:17:a8:97:b0:ef:64:f9:
                    06:a9:70:cd:3c:c1:c3:4d:95:9b:be:d2:f0:12:b5:68:
                    cc:0a:b5:67:81:b7:d7:32:cf:4a:29:49:86:88:6f:03:
                    a5:b2:ea:00:53:29:1c:ad:b8:a9:9e:e6:a5:8c:d8:c3:
                    6b:27:71:40:84:39:e4:34:4e:d2:c8:f1:a7:4d:9b:a8:
                    6b:6d:b1:41:43:03:b5:3e:cf:b9:49:e4:a8:47:3f:0f:
                    da:63:1a:d1:6f:14:4a:38:1b:a2:4c:40:a9:12:bb:96:
                    80:f2:86:26:be:6e:19:c4:86:2b:8d:ed:e4:f6:84:47
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1d:90:30:ce:60:3b:30:ef:48:2f:f1:12:ce:32:db:f6:
        6d:30:a2:10:36:a7:9e:67:94:6a:8e:fe:c1:0e:05:6a:
        e7:a3:67:5a:32:fa:bf:26:05:df:dc:32:8d:62:d2:4c:
        d9:9a:85:03:84:e0:9c:93:fb:fe:6c:ff:6f:24:95:66:
        f0:f6:19:dd:48:b5:a8:83:10:d9:6f:42:fa:5c:fc:28:
        48:bb:b7:b1:83:9b:fa:84:ca:3f:9c:ba:ac:a1:57:8e:
        14:82:25:b2:5a:f0:92:9f:8d:ce:43:e5:32:40:04:d3:
        c2:cc:9a:09:53:22:d1:05:ac:cc:fb:01:0f:79:85:17
    Fingerprint (MD5):
        92:F9:5F:A3:85:8A:90:2C:1F:DD:7E:F2:4E:27:1B:68
    Fingerprint (SHA1):
        3C:62:B7:DF:2C:69:3D:8B:C5:4F:50:74:19:DD:D1:59:4C:C8:E5:72


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6275: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6276: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191659 (0x432f946b)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:36 2012
            Not After : Tue Nov 28 00:16:36 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:62:f6:1b:5e:0c:fe:cc:e7:2f:60:be:9b:1f:e5:7f:
                    f1:eb:a5:9e:40:67:18:17:5a:2e:3d:b2:c2:66:13:19:
                    43:de:81:16:86:fe:c0:e8:c0:c5:e1:85:92:70:91:7e:
                    13:7c:e4:d1:ea:ca:4f:a5:62:cf:4e:b6:cb:0b:57:9d:
                    27:9e:bd:77:80:46:cc:b3:94:a7:72:c7:97:0c:ae:36:
                    e9:17:46:22:7c:c7:99:cd:6d:fe:4f:89:fe:38:48:b1:
                    65:ed:0b:54:22:7a:fa:a4:dd:27:7c:c2:42:9e:86:a8:
                    80:42:c1:e4:b7:7f:0c:23:a0:6a:3d:22:f1:30:80:f9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ac:84:22:6a:2e:21:fc:1d:d7:60:f8:b4:25:e8:9a:8d:
        e0:3d:bc:38:59:8e:86:91:4f:4c:d6:d2:b2:3f:95:b1:
        07:cd:44:73:e3:28:aa:96:12:7a:f8:0d:0c:81:58:c9:
        14:ad:c8:0c:34:8b:17:4c:a5:04:da:51:e8:18:17:18:
        a8:33:c8:ba:87:f6:17:fe:6a:60:18:6e:00:88:d9:11:
        b5:41:62:cd:a4:a3:c9:c5:b7:a2:43:00:0d:90:0d:e4:
        3e:fa:73:76:0d:be:52:61:04:ac:28:54:95:bb:05:17:
        c2:85:4e:59:d0:e3:3a:5f:25:61:ee:a6:e9:e6:15:07
    Fingerprint (MD5):
        95:51:1A:CF:42:CC:A2:5F:7E:B2:3F:D9:62:6D:E6:23
    Fingerprint (SHA1):
        F6:D2:4B:3B:DF:9E:C5:AC:90:93:03:8D:3C:FD:EC:F0:DA:34:A1:89


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #6277: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6278: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #6279: Extension: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #6280: Extension: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #6281: Extension: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191657 (0x432f9469)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:36 2012
            Not After : Tue Nov 28 00:16:36 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c0:ac:f1:9d:11:43:24:a0:91:df:9a:02:24:0c:75:8f:
                    e3:cd:d6:23:c0:86:28:16:12:b0:33:b0:29:6a:d2:a8:
                    a9:c6:3d:ca:b5:b9:e2:1c:6e:1f:bb:fc:cc:37:aa:9d:
                    bf:51:c1:e0:08:8b:b4:b5:62:c0:35:8b:bf:50:02:8c:
                    7d:f8:24:ff:cc:6d:21:e1:34:03:94:8e:81:60:d6:48:
                    0a:ec:8d:0c:09:a2:31:83:29:a0:7d:47:56:34:6a:b4:
                    d0:80:0f:d2:f3:0c:ed:6a:fe:71:ea:f0:06:32:fc:e7:
                    85:b9:56:aa:ea:c9:7a:ca:8f:2b:64:95:c0:95:d6:91
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        98:87:ea:f9:c9:53:64:0b:c0:46:40:2e:7b:21:9e:ff:
        be:c8:e3:02:43:11:e9:dd:4a:53:98:77:47:72:79:9c:
        88:be:0c:f6:97:9b:bb:9d:2c:df:64:67:88:b1:c0:73:
        1c:11:e5:d9:db:80:df:2a:50:33:2c:7d:02:40:f0:ea:
        1f:d9:cd:e9:e0:35:b1:7f:5e:d4:24:62:94:43:d3:91:
        70:f2:1f:12:d6:21:13:59:e6:82:16:ec:55:a9:ae:1e:
        d3:ce:d0:7d:fb:3a:50:ab:43:f1:0e:92:09:f0:c0:47:
        0c:2f:05:09:0a:78:bf:38:70:76:66:34:47:53:ff:73
    Fingerprint (MD5):
        55:90:9D:A0:1E:52:5A:F3:0D:9A:26:BE:EF:A5:81:64
    Fingerprint (SHA1):
        CC:45:86:75:24:32:4D:2A:13:D2:8D:95:E6:D2:6E:2E:3B:24:38:A7

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6282: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6283: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191658 (0x432f946a)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:36 2012
            Not After : Tue Nov 28 00:16:36 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d8:37:73:35:85:56:34:24:52:17:a8:97:b0:ef:64:f9:
                    06:a9:70:cd:3c:c1:c3:4d:95:9b:be:d2:f0:12:b5:68:
                    cc:0a:b5:67:81:b7:d7:32:cf:4a:29:49:86:88:6f:03:
                    a5:b2:ea:00:53:29:1c:ad:b8:a9:9e:e6:a5:8c:d8:c3:
                    6b:27:71:40:84:39:e4:34:4e:d2:c8:f1:a7:4d:9b:a8:
                    6b:6d:b1:41:43:03:b5:3e:cf:b9:49:e4:a8:47:3f:0f:
                    da:63:1a:d1:6f:14:4a:38:1b:a2:4c:40:a9:12:bb:96:
                    80:f2:86:26:be:6e:19:c4:86:2b:8d:ed:e4:f6:84:47
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1d:90:30:ce:60:3b:30:ef:48:2f:f1:12:ce:32:db:f6:
        6d:30:a2:10:36:a7:9e:67:94:6a:8e:fe:c1:0e:05:6a:
        e7:a3:67:5a:32:fa:bf:26:05:df:dc:32:8d:62:d2:4c:
        d9:9a:85:03:84:e0:9c:93:fb:fe:6c:ff:6f:24:95:66:
        f0:f6:19:dd:48:b5:a8:83:10:d9:6f:42:fa:5c:fc:28:
        48:bb:b7:b1:83:9b:fa:84:ca:3f:9c:ba:ac:a1:57:8e:
        14:82:25:b2:5a:f0:92:9f:8d:ce:43:e5:32:40:04:d3:
        c2:cc:9a:09:53:22:d1:05:ac:cc:fb:01:0f:79:85:17
    Fingerprint (MD5):
        92:F9:5F:A3:85:8A:90:2C:1F:DD:7E:F2:4E:27:1B:68
    Fingerprint (SHA1):
        3C:62:B7:DF:2C:69:3D:8B:C5:4F:50:74:19:DD:D1:59:4C:C8:E5:72

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6284: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6285: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191659 (0x432f946b)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:36 2012
            Not After : Tue Nov 28 00:16:36 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:62:f6:1b:5e:0c:fe:cc:e7:2f:60:be:9b:1f:e5:7f:
                    f1:eb:a5:9e:40:67:18:17:5a:2e:3d:b2:c2:66:13:19:
                    43:de:81:16:86:fe:c0:e8:c0:c5:e1:85:92:70:91:7e:
                    13:7c:e4:d1:ea:ca:4f:a5:62:cf:4e:b6:cb:0b:57:9d:
                    27:9e:bd:77:80:46:cc:b3:94:a7:72:c7:97:0c:ae:36:
                    e9:17:46:22:7c:c7:99:cd:6d:fe:4f:89:fe:38:48:b1:
                    65:ed:0b:54:22:7a:fa:a4:dd:27:7c:c2:42:9e:86:a8:
                    80:42:c1:e4:b7:7f:0c:23:a0:6a:3d:22:f1:30:80:f9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ac:84:22:6a:2e:21:fc:1d:d7:60:f8:b4:25:e8:9a:8d:
        e0:3d:bc:38:59:8e:86:91:4f:4c:d6:d2:b2:3f:95:b1:
        07:cd:44:73:e3:28:aa:96:12:7a:f8:0d:0c:81:58:c9:
        14:ad:c8:0c:34:8b:17:4c:a5:04:da:51:e8:18:17:18:
        a8:33:c8:ba:87:f6:17:fe:6a:60:18:6e:00:88:d9:11:
        b5:41:62:cd:a4:a3:c9:c5:b7:a2:43:00:0d:90:0d:e4:
        3e:fa:73:76:0d:be:52:61:04:ac:28:54:95:bb:05:17:
        c2:85:4e:59:d0:e3:3a:5f:25:61:ee:a6:e9:e6:15:07
    Fingerprint (MD5):
        95:51:1A:CF:42:CC:A2:5F:7E:B2:3F:D9:62:6D:E6:23
    Fingerprint (SHA1):
        F6:D2:4B:3B:DF:9E:C5:AC:90:93:03:8D:3C:FD:EC:F0:DA:34:A1:89

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #6286: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6287: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6288: Extension2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191661 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6289: Extension2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6290: Extension2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6291: Extension2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6292: Extension2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127191662   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6293: Extension2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #6294: Extension2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6295: Extension2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6296: Extension2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127191663   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6297: Extension2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #6298: Extension2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #6299: Extension2: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o User1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6300: Extension2: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1127191664   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6301: Extension2: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
chains.sh: #6302: Extension2: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #6303: Extension2: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o User2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6304: Extension2: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1127191665   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6305: Extension2: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
chains.sh: #6306: Extension2: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6307: Extension2: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191661 (0x432f946d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:38 2012
            Not After : Tue Nov 28 00:16:38 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ce:a3:f9:76:6f:53:53:99:63:15:5f:be:74:ba:bd:e8:
                    7b:8d:b2:d6:fb:e4:87:d7:9e:5e:3f:11:9f:5e:33:fd:
                    7a:c7:be:ee:9c:49:a5:ff:bb:0e:92:c7:64:d3:8a:12:
                    9c:cb:43:b1:d2:10:4f:7a:26:49:e9:d8:cc:dd:26:23:
                    52:62:9c:cc:79:d7:32:ae:81:c0:00:1b:cb:ad:5b:36:
                    7b:73:d7:05:d3:c0:be:ca:2a:0c:a6:36:47:f7:25:eb:
                    01:2d:8d:59:e2:d6:d1:72:10:17:4b:92:64:0b:d5:58:
                    14:1e:87:98:de:b5:f7:63:79:32:21:41:d4:1b:2a:75
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        07:f6:71:e0:04:8e:e3:8e:00:f2:37:63:62:59:0f:c5:
        9e:89:ac:73:2d:5e:4d:f6:05:c0:b6:d0:b8:d4:d5:4b:
        94:4c:35:f7:c2:44:01:27:88:35:a8:64:a6:b3:27:00:
        39:9a:ae:a0:e7:20:4f:67:96:20:19:d6:19:63:b9:01:
        20:fa:0d:e8:9f:38:4f:71:9d:99:1f:22:ad:ab:fb:b2:
        f3:f8:24:3d:f1:23:25:14:b6:a7:95:9a:79:e8:48:68:
        40:81:60:43:d4:a4:cb:74:6d:50:f9:85:b6:ac:45:a6:
        fa:03:ad:ce:20:b5:ab:9f:bc:3f:73:91:97:b8:b9:fa
    Fingerprint (MD5):
        4B:E9:C1:C1:4D:59:AD:9E:B2:82:AF:88:C8:74:F9:BD
    Fingerprint (SHA1):
        59:F4:68:05:DB:4A:9C:42:5C:01:79:7E:60:E3:96:CC:03:A4:03:B0


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6308: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6309: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191662 (0x432f946e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:38 2012
            Not After : Tue Nov 28 00:16:38 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:ca:7e:23:b9:ab:1e:c5:48:08:80:25:1c:76:ce:53:
                    73:66:ce:c5:05:84:a4:b3:7c:75:1c:ab:44:b7:33:70:
                    85:2b:be:e8:0c:95:d1:3f:87:db:61:c9:81:85:91:1c:
                    22:f9:0e:99:90:40:d6:1b:37:71:57:1c:70:f4:fe:8a:
                    2e:d8:8b:bc:35:c4:e1:16:25:05:ef:9a:c9:5a:f3:90:
                    60:ba:69:4b:ad:5a:1f:09:62:4b:58:c4:b2:ca:10:e7:
                    b5:c0:74:27:41:f7:00:89:c8:ab:71:4a:14:3d:93:36:
                    7d:3b:79:15:36:95:4f:ac:66:0a:5c:d4:fe:c2:23:91
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        cc:57:47:06:d9:68:e8:d8:33:96:30:37:39:92:94:c5:
        d9:ee:74:2d:78:59:1f:6f:5f:78:b9:9e:94:d9:ca:01:
        b2:b2:ae:97:55:3a:51:0d:90:18:fa:49:05:9d:90:d5:
        bb:8c:0a:e3:b6:8a:df:15:6c:97:38:77:92:ca:5c:a5:
        b5:41:d6:7e:16:0d:58:fc:39:35:aa:0e:b0:46:ed:e7:
        0f:03:15:d1:3f:80:1b:9b:93:bd:d5:b8:23:65:47:3c:
        53:b8:ad:d4:32:d9:82:88:1c:fb:17:02:49:e2:5a:3e:
        98:ef:9e:32:d2:d2:1d:bc:e6:1f:34:db:8a:80:97:73
    Fingerprint (MD5):
        70:A1:97:0C:A6:1B:24:B2:5D:7A:57:55:8C:C3:85:A0
    Fingerprint (SHA1):
        FA:AC:06:27:51:1B:53:10:4A:C4:1A:8D:36:69:56:E2:7E:08:24:8B


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6310: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6311: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191663 (0x432f946f)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:38 2012
            Not After : Tue Nov 28 00:16:38 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:31:d1:56:3b:52:19:00:01:31:5b:d3:70:c7:d6:6f:
                    c1:6e:09:7c:4c:58:23:77:7d:43:3d:0a:6f:a5:48:4f:
                    8d:d8:51:36:d7:4f:e8:b3:62:d7:dc:3b:d3:28:ab:fb:
                    50:4a:fb:05:33:61:0d:1a:0b:8d:26:41:90:9f:ee:91:
                    c8:6d:ac:51:74:ea:15:63:58:f8:ae:b0:50:46:34:70:
                    16:fc:51:d2:f1:80:f5:2a:be:b0:72:4e:94:a6:8b:ee:
                    f1:74:55:5e:ae:85:0c:98:c3:32:45:2a:6b:4f:a7:06:
                    89:b4:f3:eb:c7:69:32:a2:fb:3e:47:ed:32:a8:19:d7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        05:7a:2c:70:af:67:ac:8a:cf:a0:33:87:74:0c:12:f6:
        a6:f1:59:27:9c:ba:ed:f3:ee:70:3e:c6:5c:2e:09:74:
        18:e2:e7:28:72:ba:1b:1b:7b:aa:3c:23:9b:3c:c3:0c:
        fb:c2:33:8a:38:0d:67:d1:45:76:95:2f:8d:65:9b:cb:
        6c:8d:1f:a2:50:70:ae:c1:86:fb:44:e1:a9:11:bc:b2:
        e5:58:b0:6f:16:d7:d1:7b:4d:2d:5b:f1:47:31:a7:f6:
        d5:aa:ba:8d:95:c4:00:91:a4:14:31:fb:08:e6:01:46:
        12:13:5c:e0:95:e8:3f:5b:6b:d8:43:eb:6c:a7:fc:8f
    Fingerprint (MD5):
        A6:14:CA:CA:05:0C:B3:A3:3F:A1:85:42:BE:A4:1A:77
    Fingerprint (SHA1):
        26:D4:23:E6:67:E8:05:84:37:58:79:E0:56:0A:3B:BF:47:55:93:43


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6312: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6313: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #6314: Extension2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #6315: Extension2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #6316: Extension2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191661 (0x432f946d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:38 2012
            Not After : Tue Nov 28 00:16:38 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ce:a3:f9:76:6f:53:53:99:63:15:5f:be:74:ba:bd:e8:
                    7b:8d:b2:d6:fb:e4:87:d7:9e:5e:3f:11:9f:5e:33:fd:
                    7a:c7:be:ee:9c:49:a5:ff:bb:0e:92:c7:64:d3:8a:12:
                    9c:cb:43:b1:d2:10:4f:7a:26:49:e9:d8:cc:dd:26:23:
                    52:62:9c:cc:79:d7:32:ae:81:c0:00:1b:cb:ad:5b:36:
                    7b:73:d7:05:d3:c0:be:ca:2a:0c:a6:36:47:f7:25:eb:
                    01:2d:8d:59:e2:d6:d1:72:10:17:4b:92:64:0b:d5:58:
                    14:1e:87:98:de:b5:f7:63:79:32:21:41:d4:1b:2a:75
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        07:f6:71:e0:04:8e:e3:8e:00:f2:37:63:62:59:0f:c5:
        9e:89:ac:73:2d:5e:4d:f6:05:c0:b6:d0:b8:d4:d5:4b:
        94:4c:35:f7:c2:44:01:27:88:35:a8:64:a6:b3:27:00:
        39:9a:ae:a0:e7:20:4f:67:96:20:19:d6:19:63:b9:01:
        20:fa:0d:e8:9f:38:4f:71:9d:99:1f:22:ad:ab:fb:b2:
        f3:f8:24:3d:f1:23:25:14:b6:a7:95:9a:79:e8:48:68:
        40:81:60:43:d4:a4:cb:74:6d:50:f9:85:b6:ac:45:a6:
        fa:03:ad:ce:20:b5:ab:9f:bc:3f:73:91:97:b8:b9:fa
    Fingerprint (MD5):
        4B:E9:C1:C1:4D:59:AD:9E:B2:82:AF:88:C8:74:F9:BD
    Fingerprint (SHA1):
        59:F4:68:05:DB:4A:9C:42:5C:01:79:7E:60:E3:96:CC:03:A4:03:B0

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6317: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6318: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191662 (0x432f946e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:38 2012
            Not After : Tue Nov 28 00:16:38 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:ca:7e:23:b9:ab:1e:c5:48:08:80:25:1c:76:ce:53:
                    73:66:ce:c5:05:84:a4:b3:7c:75:1c:ab:44:b7:33:70:
                    85:2b:be:e8:0c:95:d1:3f:87:db:61:c9:81:85:91:1c:
                    22:f9:0e:99:90:40:d6:1b:37:71:57:1c:70:f4:fe:8a:
                    2e:d8:8b:bc:35:c4:e1:16:25:05:ef:9a:c9:5a:f3:90:
                    60:ba:69:4b:ad:5a:1f:09:62:4b:58:c4:b2:ca:10:e7:
                    b5:c0:74:27:41:f7:00:89:c8:ab:71:4a:14:3d:93:36:
                    7d:3b:79:15:36:95:4f:ac:66:0a:5c:d4:fe:c2:23:91
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        cc:57:47:06:d9:68:e8:d8:33:96:30:37:39:92:94:c5:
        d9:ee:74:2d:78:59:1f:6f:5f:78:b9:9e:94:d9:ca:01:
        b2:b2:ae:97:55:3a:51:0d:90:18:fa:49:05:9d:90:d5:
        bb:8c:0a:e3:b6:8a:df:15:6c:97:38:77:92:ca:5c:a5:
        b5:41:d6:7e:16:0d:58:fc:39:35:aa:0e:b0:46:ed:e7:
        0f:03:15:d1:3f:80:1b:9b:93:bd:d5:b8:23:65:47:3c:
        53:b8:ad:d4:32:d9:82:88:1c:fb:17:02:49:e2:5a:3e:
        98:ef:9e:32:d2:d2:1d:bc:e6:1f:34:db:8a:80:97:73
    Fingerprint (MD5):
        70:A1:97:0C:A6:1B:24:B2:5D:7A:57:55:8C:C3:85:A0
    Fingerprint (SHA1):
        FA:AC:06:27:51:1B:53:10:4A:C4:1A:8D:36:69:56:E2:7E:08:24:8B

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6319: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6320: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191663 (0x432f946f)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:38 2012
            Not After : Tue Nov 28 00:16:38 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:31:d1:56:3b:52:19:00:01:31:5b:d3:70:c7:d6:6f:
                    c1:6e:09:7c:4c:58:23:77:7d:43:3d:0a:6f:a5:48:4f:
                    8d:d8:51:36:d7:4f:e8:b3:62:d7:dc:3b:d3:28:ab:fb:
                    50:4a:fb:05:33:61:0d:1a:0b:8d:26:41:90:9f:ee:91:
                    c8:6d:ac:51:74:ea:15:63:58:f8:ae:b0:50:46:34:70:
                    16:fc:51:d2:f1:80:f5:2a:be:b0:72:4e:94:a6:8b:ee:
                    f1:74:55:5e:ae:85:0c:98:c3:32:45:2a:6b:4f:a7:06:
                    89:b4:f3:eb:c7:69:32:a2:fb:3e:47:ed:32:a8:19:d7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        05:7a:2c:70:af:67:ac:8a:cf:a0:33:87:74:0c:12:f6:
        a6:f1:59:27:9c:ba:ed:f3:ee:70:3e:c6:5c:2e:09:74:
        18:e2:e7:28:72:ba:1b:1b:7b:aa:3c:23:9b:3c:c3:0c:
        fb:c2:33:8a:38:0d:67:d1:45:76:95:2f:8d:65:9b:cb:
        6c:8d:1f:a2:50:70:ae:c1:86:fb:44:e1:a9:11:bc:b2:
        e5:58:b0:6f:16:d7:d1:7b:4d:2d:5b:f1:47:31:a7:f6:
        d5:aa:ba:8d:95:c4:00:91:a4:14:31:fb:08:e6:01:46:
        12:13:5c:e0:95:e8:3f:5b:6b:d8:43:eb:6c:a7:fc:8f
    Fingerprint (MD5):
        A6:14:CA:CA:05:0C:B3:A3:3F:A1:85:42:BE:A4:1A:77
    Fingerprint (SHA1):
        26:D4:23:E6:67:E8:05:84:37:58:79:E0:56:0A:3B:BF:47:55:93:43

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6321: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6322: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191661 (0x432f946d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:38 2012
            Not After : Tue Nov 28 00:16:38 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ce:a3:f9:76:6f:53:53:99:63:15:5f:be:74:ba:bd:e8:
                    7b:8d:b2:d6:fb:e4:87:d7:9e:5e:3f:11:9f:5e:33:fd:
                    7a:c7:be:ee:9c:49:a5:ff:bb:0e:92:c7:64:d3:8a:12:
                    9c:cb:43:b1:d2:10:4f:7a:26:49:e9:d8:cc:dd:26:23:
                    52:62:9c:cc:79:d7:32:ae:81:c0:00:1b:cb:ad:5b:36:
                    7b:73:d7:05:d3:c0:be:ca:2a:0c:a6:36:47:f7:25:eb:
                    01:2d:8d:59:e2:d6:d1:72:10:17:4b:92:64:0b:d5:58:
                    14:1e:87:98:de:b5:f7:63:79:32:21:41:d4:1b:2a:75
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        07:f6:71:e0:04:8e:e3:8e:00:f2:37:63:62:59:0f:c5:
        9e:89:ac:73:2d:5e:4d:f6:05:c0:b6:d0:b8:d4:d5:4b:
        94:4c:35:f7:c2:44:01:27:88:35:a8:64:a6:b3:27:00:
        39:9a:ae:a0:e7:20:4f:67:96:20:19:d6:19:63:b9:01:
        20:fa:0d:e8:9f:38:4f:71:9d:99:1f:22:ad:ab:fb:b2:
        f3:f8:24:3d:f1:23:25:14:b6:a7:95:9a:79:e8:48:68:
        40:81:60:43:d4:a4:cb:74:6d:50:f9:85:b6:ac:45:a6:
        fa:03:ad:ce:20:b5:ab:9f:bc:3f:73:91:97:b8:b9:fa
    Fingerprint (MD5):
        4B:E9:C1:C1:4D:59:AD:9E:B2:82:AF:88:C8:74:F9:BD
    Fingerprint (SHA1):
        59:F4:68:05:DB:4A:9C:42:5C:01:79:7E:60:E3:96:CC:03:A4:03:B0

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6323: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191661 (0x432f946d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:38 2012
            Not After : Tue Nov 28 00:16:38 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ce:a3:f9:76:6f:53:53:99:63:15:5f:be:74:ba:bd:e8:
                    7b:8d:b2:d6:fb:e4:87:d7:9e:5e:3f:11:9f:5e:33:fd:
                    7a:c7:be:ee:9c:49:a5:ff:bb:0e:92:c7:64:d3:8a:12:
                    9c:cb:43:b1:d2:10:4f:7a:26:49:e9:d8:cc:dd:26:23:
                    52:62:9c:cc:79:d7:32:ae:81:c0:00:1b:cb:ad:5b:36:
                    7b:73:d7:05:d3:c0:be:ca:2a:0c:a6:36:47:f7:25:eb:
                    01:2d:8d:59:e2:d6:d1:72:10:17:4b:92:64:0b:d5:58:
                    14:1e:87:98:de:b5:f7:63:79:32:21:41:d4:1b:2a:75
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        07:f6:71:e0:04:8e:e3:8e:00:f2:37:63:62:59:0f:c5:
        9e:89:ac:73:2d:5e:4d:f6:05:c0:b6:d0:b8:d4:d5:4b:
        94:4c:35:f7:c2:44:01:27:88:35:a8:64:a6:b3:27:00:
        39:9a:ae:a0:e7:20:4f:67:96:20:19:d6:19:63:b9:01:
        20:fa:0d:e8:9f:38:4f:71:9d:99:1f:22:ad:ab:fb:b2:
        f3:f8:24:3d:f1:23:25:14:b6:a7:95:9a:79:e8:48:68:
        40:81:60:43:d4:a4:cb:74:6d:50:f9:85:b6:ac:45:a6:
        fa:03:ad:ce:20:b5:ab:9f:bc:3f:73:91:97:b8:b9:fa
    Fingerprint (MD5):
        4B:E9:C1:C1:4D:59:AD:9E:B2:82:AF:88:C8:74:F9:BD
    Fingerprint (SHA1):
        59:F4:68:05:DB:4A:9C:42:5C:01:79:7E:60:E3:96:CC:03:A4:03:B0

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6324: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191662 (0x432f946e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:38 2012
            Not After : Tue Nov 28 00:16:38 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:ca:7e:23:b9:ab:1e:c5:48:08:80:25:1c:76:ce:53:
                    73:66:ce:c5:05:84:a4:b3:7c:75:1c:ab:44:b7:33:70:
                    85:2b:be:e8:0c:95:d1:3f:87:db:61:c9:81:85:91:1c:
                    22:f9:0e:99:90:40:d6:1b:37:71:57:1c:70:f4:fe:8a:
                    2e:d8:8b:bc:35:c4:e1:16:25:05:ef:9a:c9:5a:f3:90:
                    60:ba:69:4b:ad:5a:1f:09:62:4b:58:c4:b2:ca:10:e7:
                    b5:c0:74:27:41:f7:00:89:c8:ab:71:4a:14:3d:93:36:
                    7d:3b:79:15:36:95:4f:ac:66:0a:5c:d4:fe:c2:23:91
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        cc:57:47:06:d9:68:e8:d8:33:96:30:37:39:92:94:c5:
        d9:ee:74:2d:78:59:1f:6f:5f:78:b9:9e:94:d9:ca:01:
        b2:b2:ae:97:55:3a:51:0d:90:18:fa:49:05:9d:90:d5:
        bb:8c:0a:e3:b6:8a:df:15:6c:97:38:77:92:ca:5c:a5:
        b5:41:d6:7e:16:0d:58:fc:39:35:aa:0e:b0:46:ed:e7:
        0f:03:15:d1:3f:80:1b:9b:93:bd:d5:b8:23:65:47:3c:
        53:b8:ad:d4:32:d9:82:88:1c:fb:17:02:49:e2:5a:3e:
        98:ef:9e:32:d2:d2:1d:bc:e6:1f:34:db:8a:80:97:73
    Fingerprint (MD5):
        70:A1:97:0C:A6:1B:24:B2:5D:7A:57:55:8C:C3:85:A0
    Fingerprint (SHA1):
        FA:AC:06:27:51:1B:53:10:4A:C4:1A:8D:36:69:56:E2:7E:08:24:8B

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6325: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191662 (0x432f946e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:38 2012
            Not After : Tue Nov 28 00:16:38 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b7:ca:7e:23:b9:ab:1e:c5:48:08:80:25:1c:76:ce:53:
                    73:66:ce:c5:05:84:a4:b3:7c:75:1c:ab:44:b7:33:70:
                    85:2b:be:e8:0c:95:d1:3f:87:db:61:c9:81:85:91:1c:
                    22:f9:0e:99:90:40:d6:1b:37:71:57:1c:70:f4:fe:8a:
                    2e:d8:8b:bc:35:c4:e1:16:25:05:ef:9a:c9:5a:f3:90:
                    60:ba:69:4b:ad:5a:1f:09:62:4b:58:c4:b2:ca:10:e7:
                    b5:c0:74:27:41:f7:00:89:c8:ab:71:4a:14:3d:93:36:
                    7d:3b:79:15:36:95:4f:ac:66:0a:5c:d4:fe:c2:23:91
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        cc:57:47:06:d9:68:e8:d8:33:96:30:37:39:92:94:c5:
        d9:ee:74:2d:78:59:1f:6f:5f:78:b9:9e:94:d9:ca:01:
        b2:b2:ae:97:55:3a:51:0d:90:18:fa:49:05:9d:90:d5:
        bb:8c:0a:e3:b6:8a:df:15:6c:97:38:77:92:ca:5c:a5:
        b5:41:d6:7e:16:0d:58:fc:39:35:aa:0e:b0:46:ed:e7:
        0f:03:15:d1:3f:80:1b:9b:93:bd:d5:b8:23:65:47:3c:
        53:b8:ad:d4:32:d9:82:88:1c:fb:17:02:49:e2:5a:3e:
        98:ef:9e:32:d2:d2:1d:bc:e6:1f:34:db:8a:80:97:73
    Fingerprint (MD5):
        70:A1:97:0C:A6:1B:24:B2:5D:7A:57:55:8C:C3:85:A0
    Fingerprint (SHA1):
        FA:AC:06:27:51:1B:53:10:4A:C4:1A:8D:36:69:56:E2:7E:08:24:8B

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6326: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191663 (0x432f946f)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:38 2012
            Not After : Tue Nov 28 00:16:38 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:31:d1:56:3b:52:19:00:01:31:5b:d3:70:c7:d6:6f:
                    c1:6e:09:7c:4c:58:23:77:7d:43:3d:0a:6f:a5:48:4f:
                    8d:d8:51:36:d7:4f:e8:b3:62:d7:dc:3b:d3:28:ab:fb:
                    50:4a:fb:05:33:61:0d:1a:0b:8d:26:41:90:9f:ee:91:
                    c8:6d:ac:51:74:ea:15:63:58:f8:ae:b0:50:46:34:70:
                    16:fc:51:d2:f1:80:f5:2a:be:b0:72:4e:94:a6:8b:ee:
                    f1:74:55:5e:ae:85:0c:98:c3:32:45:2a:6b:4f:a7:06:
                    89:b4:f3:eb:c7:69:32:a2:fb:3e:47:ed:32:a8:19:d7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        05:7a:2c:70:af:67:ac:8a:cf:a0:33:87:74:0c:12:f6:
        a6:f1:59:27:9c:ba:ed:f3:ee:70:3e:c6:5c:2e:09:74:
        18:e2:e7:28:72:ba:1b:1b:7b:aa:3c:23:9b:3c:c3:0c:
        fb:c2:33:8a:38:0d:67:d1:45:76:95:2f:8d:65:9b:cb:
        6c:8d:1f:a2:50:70:ae:c1:86:fb:44:e1:a9:11:bc:b2:
        e5:58:b0:6f:16:d7:d1:7b:4d:2d:5b:f1:47:31:a7:f6:
        d5:aa:ba:8d:95:c4:00:91:a4:14:31:fb:08:e6:01:46:
        12:13:5c:e0:95:e8:3f:5b:6b:d8:43:eb:6c:a7:fc:8f
    Fingerprint (MD5):
        A6:14:CA:CA:05:0C:B3:A3:3F:A1:85:42:BE:A4:1A:77
    Fingerprint (SHA1):
        26:D4:23:E6:67:E8:05:84:37:58:79:E0:56:0A:3B:BF:47:55:93:43

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6327: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191663 (0x432f946f)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:38 2012
            Not After : Tue Nov 28 00:16:38 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d5:31:d1:56:3b:52:19:00:01:31:5b:d3:70:c7:d6:6f:
                    c1:6e:09:7c:4c:58:23:77:7d:43:3d:0a:6f:a5:48:4f:
                    8d:d8:51:36:d7:4f:e8:b3:62:d7:dc:3b:d3:28:ab:fb:
                    50:4a:fb:05:33:61:0d:1a:0b:8d:26:41:90:9f:ee:91:
                    c8:6d:ac:51:74:ea:15:63:58:f8:ae:b0:50:46:34:70:
                    16:fc:51:d2:f1:80:f5:2a:be:b0:72:4e:94:a6:8b:ee:
                    f1:74:55:5e:ae:85:0c:98:c3:32:45:2a:6b:4f:a7:06:
                    89:b4:f3:eb:c7:69:32:a2:fb:3e:47:ed:32:a8:19:d7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        05:7a:2c:70:af:67:ac:8a:cf:a0:33:87:74:0c:12:f6:
        a6:f1:59:27:9c:ba:ed:f3:ee:70:3e:c6:5c:2e:09:74:
        18:e2:e7:28:72:ba:1b:1b:7b:aa:3c:23:9b:3c:c3:0c:
        fb:c2:33:8a:38:0d:67:d1:45:76:95:2f:8d:65:9b:cb:
        6c:8d:1f:a2:50:70:ae:c1:86:fb:44:e1:a9:11:bc:b2:
        e5:58:b0:6f:16:d7:d1:7b:4d:2d:5b:f1:47:31:a7:f6:
        d5:aa:ba:8d:95:c4:00:91:a4:14:31:fb:08:e6:01:46:
        12:13:5c:e0:95:e8:3f:5b:6b:d8:43:eb:6c:a7:fc:8f
    Fingerprint (MD5):
        A6:14:CA:CA:05:0C:B3:A3:3F:A1:85:42:BE:A4:1A:77
    Fingerprint (SHA1):
        26:D4:23:E6:67:E8:05:84:37:58:79:E0:56:0A:3B:BF:47:55:93:43

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6328: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #6329: AnyPolicy: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191666 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6330: AnyPolicy: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #6331: AnyPolicy: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6332: AnyPolicy: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6333: AnyPolicy: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1127191667   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6334: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
chains.sh: #6335: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6336: AnyPolicy: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6337: AnyPolicy: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127191668   --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
0
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #6338: AnyPolicy: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #6339: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #6340: AnyPolicy: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6341: AnyPolicy: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1127191669   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6342: AnyPolicy: Creating certficate CA3CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA3CA1.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der
chains.sh: #6343: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #6344: AnyPolicy: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o User1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6345: AnyPolicy: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1127191670   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6346: AnyPolicy: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
chains.sh: #6347: AnyPolicy: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #6348: AnyPolicy: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o User2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6349: AnyPolicy: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1127191671   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6350: AnyPolicy: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
chains.sh: #6351: AnyPolicy: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB User3DB
certutil -N -d User3DB -f User3DB/dbpasswd
chains.sh: #6352: AnyPolicy: Creating DB User3DB  - PASSED
chains.sh: Creating EE certifiate request User3Req.der
certutil -s "CN=User3 EE, O=User3, C=US"  -R  -d User3DB -f User3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o User3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6353: AnyPolicy: Creating EE certifiate request User3Req.der  - PASSED
chains.sh: Creating certficate User3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1127191672   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6354: AnyPolicy: Creating certficate User3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate User3CA3.der to User3DB database
certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der
chains.sh: #6355: AnyPolicy: Importing certificate User3CA3.der to User3DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6356: AnyPolicy: Creating DB AllDB  - PASSED
chains.sh: Importing certificate RootCA.der to AllDB database
certutil -A -n RootCA  -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der
chains.sh: #6357: AnyPolicy: Importing certificate RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der
chains.sh: #6358: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #6359: AnyPolicy: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA1.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der
chains.sh: #6360: AnyPolicy: Importing certificate CA3CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191666 (0x432f9472)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:40 2012
            Not After : Tue Nov 28 00:16:40 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:78:3d:34:e6:8b:28:bb:93:1d:fc:c9:b0:d3:7e:0c:
                    c4:75:e8:1c:b4:c6:d7:19:0d:c6:cc:1c:7c:a3:67:8d:
                    4a:20:30:c4:6c:79:75:18:ec:61:f1:52:53:48:79:0c:
                    59:ae:b6:e9:93:a2:c2:67:76:52:e0:a9:58:3b:fe:7b:
                    f2:d3:93:27:d2:5a:b4:b2:33:6f:53:b6:c3:13:27:1f:
                    0b:e0:56:e2:1f:c7:79:cf:a6:75:fe:f8:f8:94:75:c7:
                    09:d2:0e:11:21:42:e3:82:0d:71:e2:b8:7e:de:fc:17:
                    1b:4d:a4:c5:92:94:90:82:c3:2e:d3:ad:02:18:05:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9e:dc:32:6e:df:a7:8f:89:7e:4f:00:fe:28:81:9c:fa:
        6c:ad:64:54:64:86:75:af:fe:94:19:89:b0:3d:7a:d0:
        0d:93:d9:e1:3f:44:25:6c:48:65:a2:f9:49:11:be:26:
        ab:6a:20:c4:9a:97:06:06:2a:6e:21:ef:24:a5:60:47:
        64:e1:d2:67:a6:70:2d:38:a7:33:bc:e7:cc:08:7d:6d:
        59:a0:d6:76:27:8b:92:28:fe:9c:b6:d6:b8:64:7a:4f:
        02:2e:99:43:38:24:11:5e:57:98:e7:27:d4:7e:f2:62:
        66:4e:c8:34:ff:1e:9c:85:a8:d8:55:68:94:4c:35:05
    Fingerprint (MD5):
        29:48:32:74:02:33:08:4A:1C:88:34:98:CC:6C:C7:51
    Fingerprint (SHA1):
        03:06:64:06:E7:09:7B:AA:A6:82:BE:82:95:BE:B7:FA:C4:EA:76:CC

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6361: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6362: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6363: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6364: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User3CA3.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191666 (0x432f9472)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:40 2012
            Not After : Tue Nov 28 00:16:40 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b9:78:3d:34:e6:8b:28:bb:93:1d:fc:c9:b0:d3:7e:0c:
                    c4:75:e8:1c:b4:c6:d7:19:0d:c6:cc:1c:7c:a3:67:8d:
                    4a:20:30:c4:6c:79:75:18:ec:61:f1:52:53:48:79:0c:
                    59:ae:b6:e9:93:a2:c2:67:76:52:e0:a9:58:3b:fe:7b:
                    f2:d3:93:27:d2:5a:b4:b2:33:6f:53:b6:c3:13:27:1f:
                    0b:e0:56:e2:1f:c7:79:cf:a6:75:fe:f8:f8:94:75:c7:
                    09:d2:0e:11:21:42:e3:82:0d:71:e2:b8:7e:de:fc:17:
                    1b:4d:a4:c5:92:94:90:82:c3:2e:d3:ad:02:18:05:41
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9e:dc:32:6e:df:a7:8f:89:7e:4f:00:fe:28:81:9c:fa:
        6c:ad:64:54:64:86:75:af:fe:94:19:89:b0:3d:7a:d0:
        0d:93:d9:e1:3f:44:25:6c:48:65:a2:f9:49:11:be:26:
        ab:6a:20:c4:9a:97:06:06:2a:6e:21:ef:24:a5:60:47:
        64:e1:d2:67:a6:70:2d:38:a7:33:bc:e7:cc:08:7d:6d:
        59:a0:d6:76:27:8b:92:28:fe:9c:b6:d6:b8:64:7a:4f:
        02:2e:99:43:38:24:11:5e:57:98:e7:27:d4:7e:f2:62:
        66:4e:c8:34:ff:1e:9c:85:a8:d8:55:68:94:4c:35:05
    Fingerprint (MD5):
        29:48:32:74:02:33:08:4A:1C:88:34:98:CC:6C:C7:51
    Fingerprint (SHA1):
        03:06:64:06:E7:09:7B:AA:A6:82:BE:82:95:BE:B7:FA:C4:EA:76:CC

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User3 EE,O=User3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6365: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User3CA3.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6366: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #6367: AnyPolicyWithLevel: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191673 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6368: AnyPolicyWithLevel: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #6369: AnyPolicyWithLevel: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6370: AnyPolicyWithLevel: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6371: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1127191674   --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #6372: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
chains.sh: #6373: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA12DB
certutil -N -d CA12DB -f CA12DB/dbpasswd
chains.sh: #6374: AnyPolicyWithLevel: Creating DB CA12DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA12Req.der
certutil -s "CN=CA12 Intermediate, O=CA12, C=US"  -R -2 -d CA12DB -f CA12DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA12Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6375: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der  - PASSED
chains.sh: Creating certficate CA12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1127191675   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6376: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA12CA1.der to CA12DB database
certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der
chains.sh: #6377: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database  - PASSED
chains.sh: Creating DB CA13DB
certutil -N -d CA13DB -f CA13DB/dbpasswd
chains.sh: #6378: AnyPolicyWithLevel: Creating DB CA13DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA13Req.der
certutil -s "CN=CA13 Intermediate, O=CA13, C=US"  -R -2 -d CA13DB -f CA13DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA13Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6379: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der  - PASSED
chains.sh: Creating certficate CA13CA12.der signed by CA12
certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1127191676   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6380: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12  - PASSED
chains.sh: Importing certificate CA13CA12.der to CA13DB database
certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der
chains.sh: #6381: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #6382: AnyPolicyWithLevel: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6383: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA13.der signed by CA13
certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1127191677   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6384: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13  - PASSED
chains.sh: Importing certificate EE1CA13.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der
chains.sh: #6385: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database  - PASSED
chains.sh: Creating DB CA22DB
certutil -N -d CA22DB -f CA22DB/dbpasswd
chains.sh: #6386: AnyPolicyWithLevel: Creating DB CA22DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA22Req.der
certutil -s "CN=CA22 Intermediate, O=CA22, C=US"  -R -2 -d CA22DB -f CA22DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA22Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6387: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der  - PASSED
chains.sh: Creating certficate CA22CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1127191678   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6388: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA22CA1.der to CA22DB database
certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der
chains.sh: #6389: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database  - PASSED
chains.sh: Creating DB CA23DB
certutil -N -d CA23DB -f CA23DB/dbpasswd
chains.sh: #6390: AnyPolicyWithLevel: Creating DB CA23DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA23Req.der
certutil -s "CN=CA23 Intermediate, O=CA23, C=US"  -R -2 -d CA23DB -f CA23DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA23Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6391: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der  - PASSED
chains.sh: Creating certficate CA23CA22.der signed by CA22
certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1127191679   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6392: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22  - PASSED
chains.sh: Importing certificate CA23CA22.der to CA23DB database
certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der
chains.sh: #6393: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #6394: AnyPolicyWithLevel: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6395: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA23.der signed by CA23
certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1127191680   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6396: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23  - PASSED
chains.sh: Importing certificate EE2CA23.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der
chains.sh: #6397: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database  - PASSED
chains.sh: Creating DB CA32DB
certutil -N -d CA32DB -f CA32DB/dbpasswd
chains.sh: #6398: AnyPolicyWithLevel: Creating DB CA32DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA32Req.der
certutil -s "CN=CA32 Intermediate, O=CA32, C=US"  -R -2 -d CA32DB -f CA32DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA32Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6399: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der  - PASSED
chains.sh: Creating certficate CA32CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1127191681   --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #6400: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA32CA1.der to CA32DB database
certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der
chains.sh: #6401: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database  - PASSED
chains.sh: Creating DB CA33DB
certutil -N -d CA33DB -f CA33DB/dbpasswd
chains.sh: #6402: AnyPolicyWithLevel: Creating DB CA33DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA33Req.der
certutil -s "CN=CA33 Intermediate, O=CA33, C=US"  -R -2 -d CA33DB -f CA33DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA33Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6403: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der  - PASSED
chains.sh: Creating certficate CA33CA32.der signed by CA32
certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1127191682   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6404: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32  - PASSED
chains.sh: Importing certificate CA33CA32.der to CA33DB database
certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der
chains.sh: #6405: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #6406: AnyPolicyWithLevel: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US"  -R  -d EE3DB -f EE3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6407: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA33.der signed by CA33
certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1127191683   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6408: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33  - PASSED
chains.sh: Importing certificate EE3CA33.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der
chains.sh: #6409: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database  - PASSED
chains.sh: Creating DB CA42DB
certutil -N -d CA42DB -f CA42DB/dbpasswd
chains.sh: #6410: AnyPolicyWithLevel: Creating DB CA42DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA42Req.der
certutil -s "CN=CA42 Intermediate, O=CA42, C=US"  -R -2 -d CA42DB -f CA42DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA42Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6411: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der  - PASSED
chains.sh: Creating certficate CA42CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1127191684   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6412: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA42CA1.der to CA42DB database
certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der
chains.sh: #6413: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database  - PASSED
chains.sh: Creating DB CA43DB
certutil -N -d CA43DB -f CA43DB/dbpasswd
chains.sh: #6414: AnyPolicyWithLevel: Creating DB CA43DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA43Req.der
certutil -s "CN=CA43 Intermediate, O=CA43, C=US"  -R -2 -d CA43DB -f CA43DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA43Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6415: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der  - PASSED
chains.sh: Creating certficate CA43CA42.der signed by CA42
certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1127191685   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6416: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42  - PASSED
chains.sh: Importing certificate CA43CA42.der to CA43DB database
certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der
chains.sh: #6417: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #6418: AnyPolicyWithLevel: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US"  -R  -d EE4DB -f EE4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE4Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6419: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA43.der signed by CA43
certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1127191686   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6420: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43  - PASSED
chains.sh: Importing certificate EE4CA43.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der
chains.sh: #6421: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database  - PASSED
chains.sh: Creating DB CA52DB
certutil -N -d CA52DB -f CA52DB/dbpasswd
chains.sh: #6422: AnyPolicyWithLevel: Creating DB CA52DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA52Req.der
certutil -s "CN=CA52 Intermediate, O=CA52, C=US"  -R -2 -d CA52DB -f CA52DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA52Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6423: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der  - PASSED
chains.sh: Creating certficate CA52CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1127191687   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6424: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA52CA1.der to CA52DB database
certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der
chains.sh: #6425: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database  - PASSED
chains.sh: Creating DB CA53DB
certutil -N -d CA53DB -f CA53DB/dbpasswd
chains.sh: #6426: AnyPolicyWithLevel: Creating DB CA53DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA53Req.der
certutil -s "CN=CA53 Intermediate, O=CA53, C=US"  -R -2 -d CA53DB -f CA53DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA53Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6427: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der  - PASSED
chains.sh: Creating certficate CA53CA52.der signed by CA52
certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1127191688   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6428: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52  - PASSED
chains.sh: Importing certificate CA53CA52.der to CA53DB database
certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der
chains.sh: #6429: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database  - PASSED
chains.sh: Creating DB EE5DB
certutil -N -d EE5DB -f EE5DB/dbpasswd
chains.sh: #6430: AnyPolicyWithLevel: Creating DB EE5DB  - PASSED
chains.sh: Creating EE certifiate request EE5Req.der
certutil -s "CN=EE5 EE, O=EE5, C=US"  -R  -d EE5DB -f EE5DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE5Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6431: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der  - PASSED
chains.sh: Creating certficate EE5CA53.der signed by CA53
certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1127191689   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6432: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53  - PASSED
chains.sh: Importing certificate EE5CA53.der to EE5DB database
certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der
chains.sh: #6433: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database  - PASSED
chains.sh: Creating DB CA61DB
certutil -N -d CA61DB -f CA61DB/dbpasswd
chains.sh: #6434: AnyPolicyWithLevel: Creating DB CA61DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA61Req.der
certutil -s "CN=CA61 Intermediate, O=CA61, C=US"  -R -2 -d CA61DB -f CA61DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA61Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6435: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der  - PASSED
chains.sh: Creating certficate CA61RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1127191690   --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n
5
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #6436: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA61RootCA.der to CA61DB database
certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der
chains.sh: #6437: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database  - PASSED
chains.sh: Creating DB CA62DB
certutil -N -d CA62DB -f CA62DB/dbpasswd
chains.sh: #6438: AnyPolicyWithLevel: Creating DB CA62DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA62Req.der
certutil -s "CN=CA62 Intermediate, O=CA62, C=US"  -R -2 -d CA62DB -f CA62DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA62Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6439: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der  - PASSED
chains.sh: Creating certficate CA62CA61.der signed by CA61
certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1127191691   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6440: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61  - PASSED
chains.sh: Importing certificate CA62CA61.der to CA62DB database
certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der
chains.sh: #6441: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database  - PASSED
chains.sh: Creating DB EE62DB
certutil -N -d EE62DB -f EE62DB/dbpasswd
chains.sh: #6442: AnyPolicyWithLevel: Creating DB EE62DB  - PASSED
chains.sh: Creating EE certifiate request EE62Req.der
certutil -s "CN=EE62 EE, O=EE62, C=US"  -R  -d EE62DB -f EE62DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE62Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6443: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der  - PASSED
chains.sh: Creating certficate EE62CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1127191692   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6444: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate EE62CA62.der to EE62DB database
certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der
chains.sh: #6445: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database  - PASSED
chains.sh: Creating DB CA63DB
certutil -N -d CA63DB -f CA63DB/dbpasswd
chains.sh: #6446: AnyPolicyWithLevel: Creating DB CA63DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA63Req.der
certutil -s "CN=CA63 Intermediate, O=CA63, C=US"  -R -2 -d CA63DB -f CA63DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA63Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6447: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der  - PASSED
chains.sh: Creating certficate CA63CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1127191693   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6448: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate CA63CA62.der to CA63DB database
certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der
chains.sh: #6449: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database  - PASSED
chains.sh: Creating DB EE63DB
certutil -N -d EE63DB -f EE63DB/dbpasswd
chains.sh: #6450: AnyPolicyWithLevel: Creating DB EE63DB  - PASSED
chains.sh: Creating EE certifiate request EE63Req.der
certutil -s "CN=EE63 EE, O=EE63, C=US"  -R  -d EE63DB -f EE63DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE63Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6451: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der  - PASSED
chains.sh: Creating certficate EE63CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1127191694   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6452: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate EE63CA63.der to EE63DB database
certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der
chains.sh: #6453: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database  - PASSED
chains.sh: Creating DB CA64DB
certutil -N -d CA64DB -f CA64DB/dbpasswd
chains.sh: #6454: AnyPolicyWithLevel: Creating DB CA64DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA64Req.der
certutil -s "CN=CA64 Intermediate, O=CA64, C=US"  -R -2 -d CA64DB -f CA64DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA64Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6455: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der  - PASSED
chains.sh: Creating certficate CA64CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1127191695   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6456: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate CA64CA63.der to CA64DB database
certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der
chains.sh: #6457: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database  - PASSED
chains.sh: Creating DB EE64DB
certutil -N -d EE64DB -f EE64DB/dbpasswd
chains.sh: #6458: AnyPolicyWithLevel: Creating DB EE64DB  - PASSED
chains.sh: Creating EE certifiate request EE64Req.der
certutil -s "CN=EE64 EE, O=EE64, C=US"  -R  -d EE64DB -f EE64DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE64Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6459: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der  - PASSED
chains.sh: Creating certficate EE64CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1127191696   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6460: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate EE64CA64.der to EE64DB database
certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der
chains.sh: #6461: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database  - PASSED
chains.sh: Creating DB CA65DB
certutil -N -d CA65DB -f CA65DB/dbpasswd
chains.sh: #6462: AnyPolicyWithLevel: Creating DB CA65DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA65Req.der
certutil -s "CN=CA65 Intermediate, O=CA65, C=US"  -R -2 -d CA65DB -f CA65DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA65Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6463: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der  - PASSED
chains.sh: Creating certficate CA65CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1127191697   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6464: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate CA65CA64.der to CA65DB database
certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der
chains.sh: #6465: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database  - PASSED
chains.sh: Creating DB EE65DB
certutil -N -d EE65DB -f EE65DB/dbpasswd
chains.sh: #6466: AnyPolicyWithLevel: Creating DB EE65DB  - PASSED
chains.sh: Creating EE certifiate request EE65Req.der
certutil -s "CN=EE65 EE, O=EE65, C=US"  -R  -d EE65DB -f EE65DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE65Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6467: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der  - PASSED
chains.sh: Creating certficate EE65CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1127191698   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6468: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate EE65CA65.der to EE65DB database
certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der
chains.sh: #6469: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database  - PASSED
chains.sh: Creating DB CA66DB
certutil -N -d CA66DB -f CA66DB/dbpasswd
chains.sh: #6470: AnyPolicyWithLevel: Creating DB CA66DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA66Req.der
certutil -s "CN=CA66 Intermediate, O=CA66, C=US"  -R -2 -d CA66DB -f CA66DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA66Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6471: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der  - PASSED
chains.sh: Creating certficate CA66CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1127191699   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6472: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate CA66CA65.der to CA66DB database
certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der
chains.sh: #6473: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database  - PASSED
chains.sh: Creating DB EE66DB
certutil -N -d EE66DB -f EE66DB/dbpasswd
chains.sh: #6474: AnyPolicyWithLevel: Creating DB EE66DB  - PASSED
chains.sh: Creating EE certifiate request EE66Req.der
certutil -s "CN=EE66 EE, O=EE66, C=US"  -R  -d EE66DB -f EE66DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE66Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6475: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der  - PASSED
chains.sh: Creating certficate EE66CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1127191700   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6476: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate EE66CA66.der to EE66DB database
certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der
chains.sh: #6477: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database  - PASSED
chains.sh: Creating DB CA67DB
certutil -N -d CA67DB -f CA67DB/dbpasswd
chains.sh: #6478: AnyPolicyWithLevel: Creating DB CA67DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA67Req.der
certutil -s "CN=CA67 Intermediate, O=CA67, C=US"  -R -2 -d CA67DB -f CA67DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA67Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6479: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der  - PASSED
chains.sh: Creating certficate CA67CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1127191701   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6480: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate CA67CA66.der to CA67DB database
certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der
chains.sh: #6481: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database  - PASSED
chains.sh: Creating DB EE67DB
certutil -N -d EE67DB -f EE67DB/dbpasswd
chains.sh: #6482: AnyPolicyWithLevel: Creating DB EE67DB  - PASSED
chains.sh: Creating EE certifiate request EE67Req.der
certutil -s "CN=EE67 EE, O=EE67, C=US"  -R  -d EE67DB -f EE67DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE67Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6483: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der  - PASSED
chains.sh: Creating certficate EE67CA67.der signed by CA67
certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1127191702   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6484: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67  - PASSED
chains.sh: Importing certificate EE67CA67.der to EE67DB database
certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der
chains.sh: #6485: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6486: AnyPolicyWithLevel: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191673 (0x432f9479)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:42 2012
            Not After : Tue Nov 28 00:16:42 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:3f:53:02:68:3c:be:ca:e8:17:0d:18:20:a4:9c:07:
                    68:db:89:3a:66:c0:4e:b4:85:da:77:95:49:a1:a2:06:
                    75:f2:b6:8c:ee:cc:15:cf:24:39:e9:a9:96:81:bd:08:
                    31:25:c9:22:5c:5f:02:c5:09:ca:b9:12:0e:8c:6c:e2:
                    1c:a9:95:f3:5d:f7:7e:0a:7c:57:09:05:e8:50:06:d0:
                    d0:cb:62:d3:63:ce:53:8c:d8:04:fa:b1:9e:d0:fc:4d:
                    ca:82:ab:a2:e4:f0:6f:a4:da:6b:d6:a1:8c:5f:90:3b:
                    f4:ec:a8:bb:3f:af:47:75:62:61:6e:71:10:6c:f1:77
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ca:27:b0:12:fb:fc:fe:b2:0b:f5:c2:22:8d:8a:15:83:
        73:33:0f:79:7b:e7:32:26:b3:95:c0:0c:4f:fe:d0:f5:
        09:40:8b:15:f1:87:7a:16:dc:34:bd:da:cb:76:56:06:
        97:a5:66:c6:e3:2c:ce:9f:44:88:27:05:b2:83:c7:58:
        56:4c:91:c7:21:3d:d1:26:2a:47:80:c3:8b:10:6e:70:
        6a:19:c7:c6:6c:58:2c:01:ac:1c:a6:16:e6:5f:eb:72:
        58:d8:a4:b1:de:9b:93:4f:93:bd:78:b5:41:6d:70:b3:
        85:66:c6:a1:96:dc:3f:77:da:95:09:71:ee:4c:df:82
    Fingerprint (MD5):
        8F:8C:8A:B9:51:AD:03:7E:E0:F8:11:49:DB:75:0B:CA
    Fingerprint (SHA1):
        E7:86:58:9A:2A:41:71:52:FE:59:54:3E:EC:9F:3E:E6:59:4B:29:B8


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6487: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6488: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191673 (0x432f9479)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:42 2012
            Not After : Tue Nov 28 00:16:42 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:3f:53:02:68:3c:be:ca:e8:17:0d:18:20:a4:9c:07:
                    68:db:89:3a:66:c0:4e:b4:85:da:77:95:49:a1:a2:06:
                    75:f2:b6:8c:ee:cc:15:cf:24:39:e9:a9:96:81:bd:08:
                    31:25:c9:22:5c:5f:02:c5:09:ca:b9:12:0e:8c:6c:e2:
                    1c:a9:95:f3:5d:f7:7e:0a:7c:57:09:05:e8:50:06:d0:
                    d0:cb:62:d3:63:ce:53:8c:d8:04:fa:b1:9e:d0:fc:4d:
                    ca:82:ab:a2:e4:f0:6f:a4:da:6b:d6:a1:8c:5f:90:3b:
                    f4:ec:a8:bb:3f:af:47:75:62:61:6e:71:10:6c:f1:77
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ca:27:b0:12:fb:fc:fe:b2:0b:f5:c2:22:8d:8a:15:83:
        73:33:0f:79:7b:e7:32:26:b3:95:c0:0c:4f:fe:d0:f5:
        09:40:8b:15:f1:87:7a:16:dc:34:bd:da:cb:76:56:06:
        97:a5:66:c6:e3:2c:ce:9f:44:88:27:05:b2:83:c7:58:
        56:4c:91:c7:21:3d:d1:26:2a:47:80:c3:8b:10:6e:70:
        6a:19:c7:c6:6c:58:2c:01:ac:1c:a6:16:e6:5f:eb:72:
        58:d8:a4:b1:de:9b:93:4f:93:bd:78:b5:41:6d:70:b3:
        85:66:c6:a1:96:dc:3f:77:da:95:09:71:ee:4c:df:82
    Fingerprint (MD5):
        8F:8C:8A:B9:51:AD:03:7E:E0:F8:11:49:DB:75:0B:CA
    Fingerprint (SHA1):
        E7:86:58:9A:2A:41:71:52:FE:59:54:3E:EC:9F:3E:E6:59:4B:29:B8


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6489: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6490: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6491: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6492: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191673 (0x432f9479)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:42 2012
            Not After : Tue Nov 28 00:16:42 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:3f:53:02:68:3c:be:ca:e8:17:0d:18:20:a4:9c:07:
                    68:db:89:3a:66:c0:4e:b4:85:da:77:95:49:a1:a2:06:
                    75:f2:b6:8c:ee:cc:15:cf:24:39:e9:a9:96:81:bd:08:
                    31:25:c9:22:5c:5f:02:c5:09:ca:b9:12:0e:8c:6c:e2:
                    1c:a9:95:f3:5d:f7:7e:0a:7c:57:09:05:e8:50:06:d0:
                    d0:cb:62:d3:63:ce:53:8c:d8:04:fa:b1:9e:d0:fc:4d:
                    ca:82:ab:a2:e4:f0:6f:a4:da:6b:d6:a1:8c:5f:90:3b:
                    f4:ec:a8:bb:3f:af:47:75:62:61:6e:71:10:6c:f1:77
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ca:27:b0:12:fb:fc:fe:b2:0b:f5:c2:22:8d:8a:15:83:
        73:33:0f:79:7b:e7:32:26:b3:95:c0:0c:4f:fe:d0:f5:
        09:40:8b:15:f1:87:7a:16:dc:34:bd:da:cb:76:56:06:
        97:a5:66:c6:e3:2c:ce:9f:44:88:27:05:b2:83:c7:58:
        56:4c:91:c7:21:3d:d1:26:2a:47:80:c3:8b:10:6e:70:
        6a:19:c7:c6:6c:58:2c:01:ac:1c:a6:16:e6:5f:eb:72:
        58:d8:a4:b1:de:9b:93:4f:93:bd:78:b5:41:6d:70:b3:
        85:66:c6:a1:96:dc:3f:77:da:95:09:71:ee:4c:df:82
    Fingerprint (MD5):
        8F:8C:8A:B9:51:AD:03:7E:E0:F8:11:49:DB:75:0B:CA
    Fingerprint (SHA1):
        E7:86:58:9A:2A:41:71:52:FE:59:54:3E:EC:9F:3E:E6:59:4B:29:B8


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US"
Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6493: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6494: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6495: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6496: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191673 (0x432f9479)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:42 2012
            Not After : Tue Nov 28 00:16:42 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:3f:53:02:68:3c:be:ca:e8:17:0d:18:20:a4:9c:07:
                    68:db:89:3a:66:c0:4e:b4:85:da:77:95:49:a1:a2:06:
                    75:f2:b6:8c:ee:cc:15:cf:24:39:e9:a9:96:81:bd:08:
                    31:25:c9:22:5c:5f:02:c5:09:ca:b9:12:0e:8c:6c:e2:
                    1c:a9:95:f3:5d:f7:7e:0a:7c:57:09:05:e8:50:06:d0:
                    d0:cb:62:d3:63:ce:53:8c:d8:04:fa:b1:9e:d0:fc:4d:
                    ca:82:ab:a2:e4:f0:6f:a4:da:6b:d6:a1:8c:5f:90:3b:
                    f4:ec:a8:bb:3f:af:47:75:62:61:6e:71:10:6c:f1:77
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ca:27:b0:12:fb:fc:fe:b2:0b:f5:c2:22:8d:8a:15:83:
        73:33:0f:79:7b:e7:32:26:b3:95:c0:0c:4f:fe:d0:f5:
        09:40:8b:15:f1:87:7a:16:dc:34:bd:da:cb:76:56:06:
        97:a5:66:c6:e3:2c:ce:9f:44:88:27:05:b2:83:c7:58:
        56:4c:91:c7:21:3d:d1:26:2a:47:80:c3:8b:10:6e:70:
        6a:19:c7:c6:6c:58:2c:01:ac:1c:a6:16:e6:5f:eb:72:
        58:d8:a4:b1:de:9b:93:4f:93:bd:78:b5:41:6d:70:b3:
        85:66:c6:a1:96:dc:3f:77:da:95:09:71:ee:4c:df:82
    Fingerprint (MD5):
        8F:8C:8A:B9:51:AD:03:7E:E0:F8:11:49:DB:75:0B:CA
    Fingerprint (SHA1):
        E7:86:58:9A:2A:41:71:52:FE:59:54:3E:EC:9F:3E:E6:59:4B:29:B8


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US"
Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6497: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191673 (0x432f9479)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:42 2012
            Not After : Tue Nov 28 00:16:42 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:3f:53:02:68:3c:be:ca:e8:17:0d:18:20:a4:9c:07:
                    68:db:89:3a:66:c0:4e:b4:85:da:77:95:49:a1:a2:06:
                    75:f2:b6:8c:ee:cc:15:cf:24:39:e9:a9:96:81:bd:08:
                    31:25:c9:22:5c:5f:02:c5:09:ca:b9:12:0e:8c:6c:e2:
                    1c:a9:95:f3:5d:f7:7e:0a:7c:57:09:05:e8:50:06:d0:
                    d0:cb:62:d3:63:ce:53:8c:d8:04:fa:b1:9e:d0:fc:4d:
                    ca:82:ab:a2:e4:f0:6f:a4:da:6b:d6:a1:8c:5f:90:3b:
                    f4:ec:a8:bb:3f:af:47:75:62:61:6e:71:10:6c:f1:77
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ca:27:b0:12:fb:fc:fe:b2:0b:f5:c2:22:8d:8a:15:83:
        73:33:0f:79:7b:e7:32:26:b3:95:c0:0c:4f:fe:d0:f5:
        09:40:8b:15:f1:87:7a:16:dc:34:bd:da:cb:76:56:06:
        97:a5:66:c6:e3:2c:ce:9f:44:88:27:05:b2:83:c7:58:
        56:4c:91:c7:21:3d:d1:26:2a:47:80:c3:8b:10:6e:70:
        6a:19:c7:c6:6c:58:2c:01:ac:1c:a6:16:e6:5f:eb:72:
        58:d8:a4:b1:de:9b:93:4f:93:bd:78:b5:41:6d:70:b3:
        85:66:c6:a1:96:dc:3f:77:da:95:09:71:ee:4c:df:82
    Fingerprint (MD5):
        8F:8C:8A:B9:51:AD:03:7E:E0:F8:11:49:DB:75:0B:CA
    Fingerprint (SHA1):
        E7:86:58:9A:2A:41:71:52:FE:59:54:3E:EC:9F:3E:E6:59:4B:29:B8


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6498: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6499: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191673 (0x432f9479)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:42 2012
            Not After : Tue Nov 28 00:16:42 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:3f:53:02:68:3c:be:ca:e8:17:0d:18:20:a4:9c:07:
                    68:db:89:3a:66:c0:4e:b4:85:da:77:95:49:a1:a2:06:
                    75:f2:b6:8c:ee:cc:15:cf:24:39:e9:a9:96:81:bd:08:
                    31:25:c9:22:5c:5f:02:c5:09:ca:b9:12:0e:8c:6c:e2:
                    1c:a9:95:f3:5d:f7:7e:0a:7c:57:09:05:e8:50:06:d0:
                    d0:cb:62:d3:63:ce:53:8c:d8:04:fa:b1:9e:d0:fc:4d:
                    ca:82:ab:a2:e4:f0:6f:a4:da:6b:d6:a1:8c:5f:90:3b:
                    f4:ec:a8:bb:3f:af:47:75:62:61:6e:71:10:6c:f1:77
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ca:27:b0:12:fb:fc:fe:b2:0b:f5:c2:22:8d:8a:15:83:
        73:33:0f:79:7b:e7:32:26:b3:95:c0:0c:4f:fe:d0:f5:
        09:40:8b:15:f1:87:7a:16:dc:34:bd:da:cb:76:56:06:
        97:a5:66:c6:e3:2c:ce:9f:44:88:27:05:b2:83:c7:58:
        56:4c:91:c7:21:3d:d1:26:2a:47:80:c3:8b:10:6e:70:
        6a:19:c7:c6:6c:58:2c:01:ac:1c:a6:16:e6:5f:eb:72:
        58:d8:a4:b1:de:9b:93:4f:93:bd:78:b5:41:6d:70:b3:
        85:66:c6:a1:96:dc:3f:77:da:95:09:71:ee:4c:df:82
    Fingerprint (MD5):
        8F:8C:8A:B9:51:AD:03:7E:E0:F8:11:49:DB:75:0B:CA
    Fingerprint (SHA1):
        E7:86:58:9A:2A:41:71:52:FE:59:54:3E:EC:9F:3E:E6:59:4B:29:B8


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6500: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6501: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6502: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6503: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191673 (0x432f9479)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:42 2012
            Not After : Tue Nov 28 00:16:42 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:3f:53:02:68:3c:be:ca:e8:17:0d:18:20:a4:9c:07:
                    68:db:89:3a:66:c0:4e:b4:85:da:77:95:49:a1:a2:06:
                    75:f2:b6:8c:ee:cc:15:cf:24:39:e9:a9:96:81:bd:08:
                    31:25:c9:22:5c:5f:02:c5:09:ca:b9:12:0e:8c:6c:e2:
                    1c:a9:95:f3:5d:f7:7e:0a:7c:57:09:05:e8:50:06:d0:
                    d0:cb:62:d3:63:ce:53:8c:d8:04:fa:b1:9e:d0:fc:4d:
                    ca:82:ab:a2:e4:f0:6f:a4:da:6b:d6:a1:8c:5f:90:3b:
                    f4:ec:a8:bb:3f:af:47:75:62:61:6e:71:10:6c:f1:77
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ca:27:b0:12:fb:fc:fe:b2:0b:f5:c2:22:8d:8a:15:83:
        73:33:0f:79:7b:e7:32:26:b3:95:c0:0c:4f:fe:d0:f5:
        09:40:8b:15:f1:87:7a:16:dc:34:bd:da:cb:76:56:06:
        97:a5:66:c6:e3:2c:ce:9f:44:88:27:05:b2:83:c7:58:
        56:4c:91:c7:21:3d:d1:26:2a:47:80:c3:8b:10:6e:70:
        6a:19:c7:c6:6c:58:2c:01:ac:1c:a6:16:e6:5f:eb:72:
        58:d8:a4:b1:de:9b:93:4f:93:bd:78:b5:41:6d:70:b3:
        85:66:c6:a1:96:dc:3f:77:da:95:09:71:ee:4c:df:82
    Fingerprint (MD5):
        8F:8C:8A:B9:51:AD:03:7E:E0:F8:11:49:DB:75:0B:CA
    Fingerprint (SHA1):
        E7:86:58:9A:2A:41:71:52:FE:59:54:3E:EC:9F:3E:E6:59:4B:29:B8


Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US"
Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US"
Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6504: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191673 (0x432f9479)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:42 2012
            Not After : Tue Nov 28 00:16:42 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:3f:53:02:68:3c:be:ca:e8:17:0d:18:20:a4:9c:07:
                    68:db:89:3a:66:c0:4e:b4:85:da:77:95:49:a1:a2:06:
                    75:f2:b6:8c:ee:cc:15:cf:24:39:e9:a9:96:81:bd:08:
                    31:25:c9:22:5c:5f:02:c5:09:ca:b9:12:0e:8c:6c:e2:
                    1c:a9:95:f3:5d:f7:7e:0a:7c:57:09:05:e8:50:06:d0:
                    d0:cb:62:d3:63:ce:53:8c:d8:04:fa:b1:9e:d0:fc:4d:
                    ca:82:ab:a2:e4:f0:6f:a4:da:6b:d6:a1:8c:5f:90:3b:
                    f4:ec:a8:bb:3f:af:47:75:62:61:6e:71:10:6c:f1:77
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ca:27:b0:12:fb:fc:fe:b2:0b:f5:c2:22:8d:8a:15:83:
        73:33:0f:79:7b:e7:32:26:b3:95:c0:0c:4f:fe:d0:f5:
        09:40:8b:15:f1:87:7a:16:dc:34:bd:da:cb:76:56:06:
        97:a5:66:c6:e3:2c:ce:9f:44:88:27:05:b2:83:c7:58:
        56:4c:91:c7:21:3d:d1:26:2a:47:80:c3:8b:10:6e:70:
        6a:19:c7:c6:6c:58:2c:01:ac:1c:a6:16:e6:5f:eb:72:
        58:d8:a4:b1:de:9b:93:4f:93:bd:78:b5:41:6d:70:b3:
        85:66:c6:a1:96:dc:3f:77:da:95:09:71:ee:4c:df:82
    Fingerprint (MD5):
        8F:8C:8A:B9:51:AD:03:7E:E0:F8:11:49:DB:75:0B:CA
    Fingerprint (SHA1):
        E7:86:58:9A:2A:41:71:52:FE:59:54:3E:EC:9F:3E:E6:59:4B:29:B8


Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US"
Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #6505: AnyPolicyWithLevel: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191673 (0x432f9479)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:42 2012
            Not After : Tue Nov 28 00:16:42 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:3f:53:02:68:3c:be:ca:e8:17:0d:18:20:a4:9c:07:
                    68:db:89:3a:66:c0:4e:b4:85:da:77:95:49:a1:a2:06:
                    75:f2:b6:8c:ee:cc:15:cf:24:39:e9:a9:96:81:bd:08:
                    31:25:c9:22:5c:5f:02:c5:09:ca:b9:12:0e:8c:6c:e2:
                    1c:a9:95:f3:5d:f7:7e:0a:7c:57:09:05:e8:50:06:d0:
                    d0:cb:62:d3:63:ce:53:8c:d8:04:fa:b1:9e:d0:fc:4d:
                    ca:82:ab:a2:e4:f0:6f:a4:da:6b:d6:a1:8c:5f:90:3b:
                    f4:ec:a8:bb:3f:af:47:75:62:61:6e:71:10:6c:f1:77
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ca:27:b0:12:fb:fc:fe:b2:0b:f5:c2:22:8d:8a:15:83:
        73:33:0f:79:7b:e7:32:26:b3:95:c0:0c:4f:fe:d0:f5:
        09:40:8b:15:f1:87:7a:16:dc:34:bd:da:cb:76:56:06:
        97:a5:66:c6:e3:2c:ce:9f:44:88:27:05:b2:83:c7:58:
        56:4c:91:c7:21:3d:d1:26:2a:47:80:c3:8b:10:6e:70:
        6a:19:c7:c6:6c:58:2c:01:ac:1c:a6:16:e6:5f:eb:72:
        58:d8:a4:b1:de:9b:93:4f:93:bd:78:b5:41:6d:70:b3:
        85:66:c6:a1:96:dc:3f:77:da:95:09:71:ee:4c:df:82
    Fingerprint (MD5):
        8F:8C:8A:B9:51:AD:03:7E:E0:F8:11:49:DB:75:0B:CA
    Fingerprint (SHA1):
        E7:86:58:9A:2A:41:71:52:FE:59:54:3E:EC:9F:3E:E6:59:4B:29:B8


Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US"
Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #6506: AnyPolicyWithLevel: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191673 (0x432f9479)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:42 2012
            Not After : Tue Nov 28 00:16:42 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:3f:53:02:68:3c:be:ca:e8:17:0d:18:20:a4:9c:07:
                    68:db:89:3a:66:c0:4e:b4:85:da:77:95:49:a1:a2:06:
                    75:f2:b6:8c:ee:cc:15:cf:24:39:e9:a9:96:81:bd:08:
                    31:25:c9:22:5c:5f:02:c5:09:ca:b9:12:0e:8c:6c:e2:
                    1c:a9:95:f3:5d:f7:7e:0a:7c:57:09:05:e8:50:06:d0:
                    d0:cb:62:d3:63:ce:53:8c:d8:04:fa:b1:9e:d0:fc:4d:
                    ca:82:ab:a2:e4:f0:6f:a4:da:6b:d6:a1:8c:5f:90:3b:
                    f4:ec:a8:bb:3f:af:47:75:62:61:6e:71:10:6c:f1:77
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ca:27:b0:12:fb:fc:fe:b2:0b:f5:c2:22:8d:8a:15:83:
        73:33:0f:79:7b:e7:32:26:b3:95:c0:0c:4f:fe:d0:f5:
        09:40:8b:15:f1:87:7a:16:dc:34:bd:da:cb:76:56:06:
        97:a5:66:c6:e3:2c:ce:9f:44:88:27:05:b2:83:c7:58:
        56:4c:91:c7:21:3d:d1:26:2a:47:80:c3:8b:10:6e:70:
        6a:19:c7:c6:6c:58:2c:01:ac:1c:a6:16:e6:5f:eb:72:
        58:d8:a4:b1:de:9b:93:4f:93:bd:78:b5:41:6d:70:b3:
        85:66:c6:a1:96:dc:3f:77:da:95:09:71:ee:4c:df:82
    Fingerprint (MD5):
        8F:8C:8A:B9:51:AD:03:7E:E0:F8:11:49:DB:75:0B:CA
    Fingerprint (SHA1):
        E7:86:58:9A:2A:41:71:52:FE:59:54:3E:EC:9F:3E:E6:59:4B:29:B8


Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US"
Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #6507: AnyPolicyWithLevel: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191673 (0x432f9479)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:42 2012
            Not After : Tue Nov 28 00:16:42 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:3f:53:02:68:3c:be:ca:e8:17:0d:18:20:a4:9c:07:
                    68:db:89:3a:66:c0:4e:b4:85:da:77:95:49:a1:a2:06:
                    75:f2:b6:8c:ee:cc:15:cf:24:39:e9:a9:96:81:bd:08:
                    31:25:c9:22:5c:5f:02:c5:09:ca:b9:12:0e:8c:6c:e2:
                    1c:a9:95:f3:5d:f7:7e:0a:7c:57:09:05:e8:50:06:d0:
                    d0:cb:62:d3:63:ce:53:8c:d8:04:fa:b1:9e:d0:fc:4d:
                    ca:82:ab:a2:e4:f0:6f:a4:da:6b:d6:a1:8c:5f:90:3b:
                    f4:ec:a8:bb:3f:af:47:75:62:61:6e:71:10:6c:f1:77
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ca:27:b0:12:fb:fc:fe:b2:0b:f5:c2:22:8d:8a:15:83:
        73:33:0f:79:7b:e7:32:26:b3:95:c0:0c:4f:fe:d0:f5:
        09:40:8b:15:f1:87:7a:16:dc:34:bd:da:cb:76:56:06:
        97:a5:66:c6:e3:2c:ce:9f:44:88:27:05:b2:83:c7:58:
        56:4c:91:c7:21:3d:d1:26:2a:47:80:c3:8b:10:6e:70:
        6a:19:c7:c6:6c:58:2c:01:ac:1c:a6:16:e6:5f:eb:72:
        58:d8:a4:b1:de:9b:93:4f:93:bd:78:b5:41:6d:70:b3:
        85:66:c6:a1:96:dc:3f:77:da:95:09:71:ee:4c:df:82
    Fingerprint (MD5):
        8F:8C:8A:B9:51:AD:03:7E:E0:F8:11:49:DB:75:0B:CA
    Fingerprint (SHA1):
        E7:86:58:9A:2A:41:71:52:FE:59:54:3E:EC:9F:3E:E6:59:4B:29:B8


Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US"
Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #6508: AnyPolicyWithLevel: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191673 (0x432f9479)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:42 2012
            Not After : Tue Nov 28 00:16:42 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cf:3f:53:02:68:3c:be:ca:e8:17:0d:18:20:a4:9c:07:
                    68:db:89:3a:66:c0:4e:b4:85:da:77:95:49:a1:a2:06:
                    75:f2:b6:8c:ee:cc:15:cf:24:39:e9:a9:96:81:bd:08:
                    31:25:c9:22:5c:5f:02:c5:09:ca:b9:12:0e:8c:6c:e2:
                    1c:a9:95:f3:5d:f7:7e:0a:7c:57:09:05:e8:50:06:d0:
                    d0:cb:62:d3:63:ce:53:8c:d8:04:fa:b1:9e:d0:fc:4d:
                    ca:82:ab:a2:e4:f0:6f:a4:da:6b:d6:a1:8c:5f:90:3b:
                    f4:ec:a8:bb:3f:af:47:75:62:61:6e:71:10:6c:f1:77
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        ca:27:b0:12:fb:fc:fe:b2:0b:f5:c2:22:8d:8a:15:83:
        73:33:0f:79:7b:e7:32:26:b3:95:c0:0c:4f:fe:d0:f5:
        09:40:8b:15:f1:87:7a:16:dc:34:bd:da:cb:76:56:06:
        97:a5:66:c6:e3:2c:ce:9f:44:88:27:05:b2:83:c7:58:
        56:4c:91:c7:21:3d:d1:26:2a:47:80:c3:8b:10:6e:70:
        6a:19:c7:c6:6c:58:2c:01:ac:1c:a6:16:e6:5f:eb:72:
        58:d8:a4:b1:de:9b:93:4f:93:bd:78:b5:41:6d:70:b3:
        85:66:c6:a1:96:dc:3f:77:da:95:09:71:ee:4c:df:82
    Fingerprint (MD5):
        8F:8C:8A:B9:51:AD:03:7E:E0:F8:11:49:DB:75:0B:CA
    Fingerprint (SHA1):
        E7:86:58:9A:2A:41:71:52:FE:59:54:3E:EC:9F:3E:E6:59:4B:29:B8


Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US"
Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US"
Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #6509: AnyPolicyWithLevel: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6510: AnyPolicyWithLevel: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6511: explicitPolicy: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191703 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6512: explicitPolicy: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6513: explicitPolicy: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB nonEVCADB
certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd
chains.sh: #6514: explicitPolicy: Creating DB nonEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request nonEVCAReq.der
certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US"  -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o nonEVCAReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6515: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der  - PASSED
chains.sh: Creating certficate nonEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1127191704   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6516: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database
certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der
chains.sh: #6517: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database  - PASSED
chains.sh: Creating DB EVCADB
certutil -N -d EVCADB -f EVCADB/dbpasswd
chains.sh: #6518: explicitPolicy: Creating DB EVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request EVCAReq.der
certutil -s "CN=EVCA Intermediate, O=EVCA, C=US"  -R -2 -d EVCADB -f EVCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EVCAReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6519: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der  - PASSED
chains.sh: Creating certficate EVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1127191705   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6520: explicitPolicy: Creating certficate EVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate EVCARoot.der to EVCADB database
certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der
chains.sh: #6521: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database  - PASSED
chains.sh: Creating DB otherEVCADB
certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd
chains.sh: #6522: explicitPolicy: Creating DB otherEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request otherEVCAReq.der
certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US"  -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o otherEVCAReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6523: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der  - PASSED
chains.sh: Creating certficate otherEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1127191706   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6524: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database
certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der
chains.sh: #6525: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database  - PASSED
chains.sh: Creating DB validEVDB
certutil -N -d validEVDB -f validEVDB/dbpasswd
chains.sh: #6526: explicitPolicy: Creating DB validEVDB  - PASSED
chains.sh: Creating EE certifiate request validEVReq.der
certutil -s "CN=validEV EE, O=validEV, C=US"  -R  -d validEVDB -f validEVDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o validEVReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6527: explicitPolicy: Creating EE certifiate request validEVReq.der  - PASSED
chains.sh: Creating certficate validEVEVCA.der signed by EVCA
certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1127191707   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6528: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA  - PASSED
chains.sh: Importing certificate validEVEVCA.der to validEVDB database
certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der
chains.sh: #6529: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database  - PASSED
chains.sh: Creating DB invalidEVDB
certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd
chains.sh: #6530: explicitPolicy: Creating DB invalidEVDB  - PASSED
chains.sh: Creating EE certifiate request invalidEVReq.der
certutil -s "CN=invalidEV EE, O=invalidEV, C=US"  -R  -d invalidEVDB -f invalidEVDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o invalidEVReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6531: explicitPolicy: Creating EE certifiate request invalidEVReq.der  - PASSED
chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA
certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1127191708   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6532: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA  - PASSED
chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database
certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der
chains.sh: #6533: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database  - PASSED
chains.sh: Creating DB wrongEVOIDDB
certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd
chains.sh: #6534: explicitPolicy: Creating DB wrongEVOIDDB  - PASSED
chains.sh: Creating EE certifiate request wrongEVOIDReq.der
certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US"  -R  -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o wrongEVOIDReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6535: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der  - PASSED
chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA
certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1127191709   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6536: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA  - PASSED
chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database
certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der
chains.sh: #6537: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6538: explicitPolicy: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  validEVEVCA.der EVCARoot.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191703 (0x432f9497)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:54 2012
            Not After : Tue Nov 28 00:16:54 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cb:26:b1:bc:7a:29:45:32:ca:fa:9c:dd:4a:55:53:f5:
                    99:7c:e2:09:a1:ed:aa:37:c3:09:82:25:b7:14:02:c1:
                    84:83:da:58:e5:6e:28:dd:80:2e:ca:87:b6:98:0e:b3:
                    08:df:1e:b2:33:df:39:89:80:89:c2:4f:e2:b9:67:ac:
                    1d:b4:2e:00:81:f6:d6:27:25:7e:86:4a:75:cc:6e:d5:
                    50:42:eb:86:f3:04:a4:76:00:13:ab:e2:bf:14:16:3d:
                    e0:d7:1a:f6:a4:d3:40:35:5d:2b:69:71:b0:0a:3a:11:
                    66:2e:1c:53:a6:61:5a:c1:9d:56:11:b6:56:4e:16:1b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        28:f6:d6:41:80:21:0e:f4:c8:63:40:a6:a4:40:cc:39:
        dc:7a:6e:dd:2e:c0:dc:f8:72:26:f3:7a:9d:64:39:2a:
        62:1e:34:62:5b:60:e7:a0:b3:58:92:fc:37:3e:d0:3e:
        37:e0:3d:1d:07:28:df:b9:63:c1:d3:87:30:d9:b0:98:
        57:ae:a4:38:e8:f0:fc:9d:fc:6c:d7:a8:a4:e2:f4:da:
        4e:61:15:83:76:7b:00:08:2b:d4:3c:0f:1d:7d:ea:a4:
        5c:db:10:00:23:6e:8b:5d:32:2c:38:67:dc:c3:80:57:
        f2:96:91:6d:81:a1:3c:85:a4:79:9b:09:52:bd:54:2b
    Fingerprint (MD5):
        B4:71:AC:47:F4:2E:33:5A:0D:61:22:BB:8B:20:C5:0D
    Fingerprint (SHA1):
        3D:4A:D7:FD:9B:F1:D1:4E:E4:DB:D3:D1:23:8A:68:1C:22:AC:37:75


Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #6539: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6540: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6541: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #6542: explicitPolicy: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  validEVEVCA.der EVCARoot.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191703 (0x432f9497)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:54 2012
            Not After : Tue Nov 28 00:16:54 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cb:26:b1:bc:7a:29:45:32:ca:fa:9c:dd:4a:55:53:f5:
                    99:7c:e2:09:a1:ed:aa:37:c3:09:82:25:b7:14:02:c1:
                    84:83:da:58:e5:6e:28:dd:80:2e:ca:87:b6:98:0e:b3:
                    08:df:1e:b2:33:df:39:89:80:89:c2:4f:e2:b9:67:ac:
                    1d:b4:2e:00:81:f6:d6:27:25:7e:86:4a:75:cc:6e:d5:
                    50:42:eb:86:f3:04:a4:76:00:13:ab:e2:bf:14:16:3d:
                    e0:d7:1a:f6:a4:d3:40:35:5d:2b:69:71:b0:0a:3a:11:
                    66:2e:1c:53:a6:61:5a:c1:9d:56:11:b6:56:4e:16:1b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        28:f6:d6:41:80:21:0e:f4:c8:63:40:a6:a4:40:cc:39:
        dc:7a:6e:dd:2e:c0:dc:f8:72:26:f3:7a:9d:64:39:2a:
        62:1e:34:62:5b:60:e7:a0:b3:58:92:fc:37:3e:d0:3e:
        37:e0:3d:1d:07:28:df:b9:63:c1:d3:87:30:d9:b0:98:
        57:ae:a4:38:e8:f0:fc:9d:fc:6c:d7:a8:a4:e2:f4:da:
        4e:61:15:83:76:7b:00:08:2b:d4:3c:0f:1d:7d:ea:a4:
        5c:db:10:00:23:6e:8b:5d:32:2c:38:67:dc:c3:80:57:
        f2:96:91:6d:81:a1:3c:85:a4:79:9b:09:52:bd:54:2b
    Fingerprint (MD5):
        B4:71:AC:47:F4:2E:33:5A:0D:61:22:BB:8B:20:C5:0D
    Fingerprint (SHA1):
        3D:4A:D7:FD:9B:F1:D1:4E:E4:DB:D3:D1:23:8A:68:1C:22:AC:37:75

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #6543: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6544: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6545: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6546: Mapping: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191710 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6547: Mapping: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6548: Mapping: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6549: Mapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6550: Mapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127191711   --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #6551: Mapping: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #6552: Mapping: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6553: Mapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6554: Mapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127191712   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6555: Mapping: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #6556: Mapping: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #6557: Mapping: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6558: Mapping: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1127191713   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6559: Mapping: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #6560: Mapping: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6561: Mapping: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #6562: Mapping: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #6563: Mapping: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #6564: Mapping: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191710 (0x432f949e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:56 2012
            Not After : Tue Nov 28 00:16:56 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ca:37:98:87:49:9e:b9:7c:db:c4:9b:93:6c:5c:07:bd:
                    e1:30:a6:ec:c1:b8:96:39:57:29:c3:a0:f7:1a:4b:5f:
                    e4:06:93:0d:29:6b:82:90:40:4a:a9:8a:bd:6a:56:04:
                    4e:0c:43:ff:48:64:1b:55:1a:aa:29:48:5b:73:e9:9b:
                    74:aa:67:9b:c4:7c:87:22:43:59:64:a2:61:4b:ed:1d:
                    be:48:23:d8:51:fa:c1:b6:d1:8b:93:d7:ed:8f:62:3c:
                    2e:78:72:65:06:d1:3f:83:12:dd:5e:cb:e3:39:92:4c:
                    66:e9:df:90:93:fa:d7:b6:93:e5:a2:e7:90:c7:f1:ff
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:fb:56:7b:81:ac:92:ef:7d:8a:31:26:e6:bf:07:27:
        4d:f5:cd:49:dd:eb:19:82:91:bc:8b:49:6f:8a:52:d8:
        8e:8f:11:c9:e3:79:57:f1:79:c2:e2:d8:17:30:30:78:
        22:2b:6c:86:32:94:bb:bc:90:bd:0f:cd:11:e9:a8:4c:
        d1:82:b0:c8:28:dc:2a:41:7e:fa:02:e0:b4:7e:ee:d5:
        ff:ae:4e:d2:2b:42:a9:6b:d1:53:1e:0b:67:64:ac:25:
        51:e6:94:d2:bb:69:d2:41:e7:08:9f:65:26:1e:cd:d7:
        7e:3d:88:71:c4:39:6d:e7:c0:a9:1a:5f:b8:32:8a:31
    Fingerprint (MD5):
        16:EF:57:48:93:49:66:2B:91:43:7E:77:F1:FD:62:D4
    Fingerprint (SHA1):
        0C:9B:D2:62:D4:B7:C1:B3:0F:FA:A8:82:AB:70:4B:84:F9:D8:2F:55

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6565: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6566: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6567: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191711 (0x432f949f)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:56 2012
            Not After : Tue Nov 28 00:16:56 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c8:4f:38:ec:8e:6a:be:88:1b:77:98:75:88:d8:1c:44:
                    61:af:c0:14:5e:8a:45:f3:57:e4:34:d7:a1:24:06:eb:
                    ed:9e:27:d5:68:cb:b4:ff:10:0a:a4:9a:20:5f:a9:82:
                    26:05:01:b6:81:c8:8e:52:d6:bc:f0:cb:44:18:94:4e:
                    d8:ab:00:b5:34:ff:8e:c9:da:1f:2c:3a:b2:0a:f9:cb:
                    ec:3f:d6:42:77:d3:5e:3a:e5:d1:b3:c0:c0:a0:bb:26:
                    79:a0:b7:3b:cf:c9:79:bf:cd:9f:55:11:65:d2:de:a7:
                    07:1a:15:dd:dc:61:1a:65:9e:5e:ef:cb:71:00:c4:c1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1d:e5:c9:bf:45:92:fe:71:18:d7:0d:f1:a3:5a:29:15:
        82:a2:fa:11:f8:80:1a:40:62:8e:13:2d:57:88:9d:d3:
        ee:17:22:ac:77:91:ff:d5:1b:17:75:df:46:ec:3a:20:
        16:c4:96:9b:77:b9:ee:d6:6f:f5:31:46:d2:98:af:a8:
        86:1a:e5:b6:1f:d3:02:13:07:84:19:47:4f:52:ac:71:
        66:32:a1:d4:81:3e:4a:70:0a:aa:26:d9:48:a5:9d:21:
        a7:79:54:c5:98:ca:f2:5e:d7:b1:d5:7e:6b:9b:8d:a4:
        ae:6c:60:b2:4f:a6:41:b4:a4:ce:d6:66:ff:29:18:83
    Fingerprint (MD5):
        B0:6B:AB:9A:48:CD:88:07:92:EB:AE:83:71:1A:33:80
    Fingerprint (SHA1):
        64:A8:8C:53:90:9E:9F:DB:4F:D9:70:D3:97:4D:12:0C:11:0B:11:B3

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6568: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6569: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191712 (0x432f94a0)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:57 2012
            Not After : Tue Nov 28 00:16:57 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ea:de:69:29:b1:79:3a:2c:27:38:5e:a7:0e:dc:53:2c:
                    23:d1:4a:62:1c:0f:3a:ea:83:2f:eb:93:e1:a4:65:9c:
                    dc:b5:fd:51:fb:fd:33:7e:e9:55:01:c9:43:e8:c1:4e:
                    a6:5f:bd:d1:a2:98:48:c7:0c:bf:48:55:f5:59:e6:b7:
                    d8:0d:5a:46:36:ce:78:75:e1:45:ee:bd:dd:12:e7:16:
                    93:a5:57:78:49:d7:f6:cd:2f:fe:8c:f6:4b:9a:1c:99:
                    78:5b:49:e5:ac:83:01:7b:08:c3:e2:b7:db:8d:b5:6c:
                    c2:61:78:db:7b:29:22:ef:48:cb:ca:a6:fc:c2:50:6b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7f:60:b1:02:a5:4c:e1:72:86:8e:54:fc:9c:72:64:92:
        00:7b:91:3d:a2:c0:d2:ca:90:05:7d:b0:8c:66:3d:60:
        da:95:3d:0b:f1:8d:46:1e:b5:c1:c4:09:b1:e5:40:a2:
        e3:71:2a:7f:47:12:4a:88:4c:e8:09:00:86:a9:8a:a6:
        68:d7:dd:09:a5:73:a6:80:c7:93:44:87:40:86:2e:9d:
        de:84:f0:e8:00:2e:38:5e:4d:75:2d:4b:2d:ab:db:6e:
        b5:3a:d6:15:f2:47:ae:18:bd:42:e8:e4:8c:fe:20:8c:
        98:56:3e:2b:d7:e1:06:36:97:5c:3e:d9:d5:c0:2a:80
    Fingerprint (MD5):
        AC:46:4A:DC:F1:4B:B5:44:72:0A:6F:D6:7D:CC:B5:88
    Fingerprint (SHA1):
        23:26:BB:0A:72:34:07:08:9A:AE:68:95:CC:7A:9C:CB:BA:AE:21:B9

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #6570: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6571: Mapping2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191714 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6572: Mapping2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6573: Mapping2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6574: Mapping2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6575: Mapping2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127191715   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6576: Mapping2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #6577: Mapping2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6578: Mapping2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6579: Mapping2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127191716   --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #6580: Mapping2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #6581: Mapping2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #6582: Mapping2: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6583: Mapping2: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1127191717   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6584: Mapping2: Creating certficate CA3CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate CA3CA2.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der
chains.sh: #6585: Mapping2: Importing certificate CA3CA2.der to CA3DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #6586: Mapping2: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6587: Mapping2: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1127191718   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6588: Mapping2: Creating certficate UserCA3.der signed by CA3  - PASSED
chains.sh: Importing certificate UserCA3.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der
chains.sh: #6589: Mapping2: Importing certificate UserCA3.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6590: Mapping2: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #6591: Mapping2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #6592: Mapping2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #6593: Mapping2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA2.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der
chains.sh: #6594: Mapping2: Importing certificate CA3CA2.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191714 (0x432f94a2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:58 2012
            Not After : Tue Nov 28 00:16:58 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ab:fd:1c:06:45:16:c8:89:a7:98:20:9e:a0:c8:cd:93:
                    6d:0d:2a:c5:a7:91:a0:da:d7:57:92:bb:68:03:c9:69:
                    69:1e:32:f3:e8:67:7a:40:fc:e7:f1:4b:24:4f:f3:f5:
                    31:f0:bf:a5:28:47:34:9b:ce:b9:20:52:41:1c:48:53:
                    9c:da:e5:6d:78:e2:d2:58:17:c8:27:6f:a1:14:33:47:
                    2e:b3:d7:c2:f5:65:fa:f5:81:25:98:99:10:7a:13:84:
                    75:ad:27:4b:6e:dd:27:ff:8e:00:15:8c:8d:5a:09:2f:
                    1f:c7:92:21:7a:51:91:8d:4f:6f:86:24:e5:24:9a:5f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        86:6e:56:37:08:d9:7d:85:eb:27:2e:3f:87:2f:fc:44:
        72:49:d8:7d:6b:98:59:eb:70:67:f6:1b:1a:e4:a5:0c:
        83:94:f4:2a:f8:de:36:e4:7c:11:1d:ed:0d:da:29:fb:
        06:37:fe:f3:cf:86:bd:ce:62:64:14:70:5d:72:62:bc:
        75:52:85:ac:e0:93:a1:63:f2:7b:dc:1a:97:0a:a5:e3:
        c9:bb:9f:db:7d:eb:7c:45:98:3e:5a:d6:4d:d5:21:26:
        73:84:e3:9c:dc:d2:23:61:d0:22:58:4c:a7:4c:b8:6c:
        78:13:e7:e6:08:11:b2:51:d7:c7:96:67:48:c7:3a:c5
    Fingerprint (MD5):
        FD:9A:06:FD:0C:C3:B9:2D:09:3E:26:85:58:11:59:BB
    Fingerprint (SHA1):
        10:89:80:0D:1D:6F:20:59:89:DA:5E:71:4E:54:AE:84:65:AA:88:97

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6595: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6596: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191715 (0x432f94a3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:58 2012
            Not After : Tue Nov 28 00:16:58 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a9:c3:59:97:4b:93:d3:f5:cd:c6:ac:05:97:56:82:6d:
                    17:0e:60:38:9e:9e:00:75:b5:ac:a3:2a:b9:5d:7f:44:
                    9d:c5:74:15:0a:38:2c:dc:eb:9e:70:07:60:0a:b2:b0:
                    80:8e:64:08:a8:2d:69:c5:8e:67:d1:4d:a1:67:78:49:
                    ad:65:65:07:b6:85:dd:7c:6f:43:4c:6d:78:57:12:c4:
                    ef:61:78:b7:94:2c:c0:b4:fb:9c:c2:a0:26:c3:bd:82:
                    cd:76:2a:81:94:20:5b:0f:2b:6a:a8:57:e5:ec:09:48:
                    ea:60:6c:e6:bd:22:5f:2b:75:8c:cc:c3:73:43:af:b1
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        73:06:fa:22:93:b3:33:38:48:00:85:21:ad:c1:64:b0:
        86:78:4b:e7:85:67:26:d5:86:14:66:ac:d5:37:17:50:
        25:54:69:1a:12:42:c9:2a:a3:bc:64:97:e3:0e:97:83:
        e4:34:a1:a3:d2:0d:2e:78:3d:71:31:da:45:01:0a:3e:
        21:82:5d:d6:16:6c:06:2c:2e:d3:d2:ac:bd:6a:6f:d5:
        57:d0:eb:2c:71:79:cb:b5:b3:4e:b7:1f:25:53:2f:f7:
        2a:2e:bd:13:f7:d9:22:3d:89:cd:4f:ca:ae:b0:73:38:
        89:95:57:e1:5a:49:34:a6:eb:b7:16:27:2b:0e:d5:7a
    Fingerprint (MD5):
        CE:2E:11:F8:EC:45:9D:15:FF:D4:D1:11:54:D9:8B:9C
    Fingerprint (SHA1):
        84:29:95:9A:CD:0D:F6:B8:94:DA:A9:BA:D2:14:7F:F1:30:06:D2:89

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6597: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6598: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6599: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191716 (0x432f94a4)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:16:58 2012
            Not After : Tue Nov 28 00:16:58 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    92:7c:05:51:f1:eb:67:34:36:d4:6a:cc:bd:d4:ad:20:
                    61:80:cb:ab:3e:e8:8f:1d:ca:7e:d8:3c:0b:48:b6:30:
                    ca:db:65:bf:1c:02:95:47:46:c1:34:0c:dd:37:51:6f:
                    1c:38:c2:bb:1f:d0:36:59:e3:20:8e:28:a7:0a:5c:45:
                    97:1d:97:f5:ba:ce:78:0e:97:96:df:1e:0a:1e:c1:41:
                    f0:61:1b:d0:b8:50:e3:26:5b:eb:83:ac:ad:a1:f6:37:
                    11:95:bc:d1:11:06:55:62:45:b3:be:92:f6:0a:bb:11:
                    c7:54:9f:dc:4e:c2:bf:19:7c:2c:b1:1c:df:5c:c7:c5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7b:64:10:52:da:b8:6f:4d:38:4e:24:9c:b2:5a:63:78:
        a1:32:c2:02:26:6d:84:e5:29:7d:d7:d2:fd:04:07:cf:
        6f:ce:64:13:07:7a:db:18:5b:c0:5e:fb:b7:97:44:d5:
        c3:39:1f:ee:82:54:3f:46:58:d3:e7:29:e5:83:00:e7:
        b0:41:5d:8b:84:9e:0d:c1:58:68:d9:08:89:88:51:d3:
        28:55:c9:af:17:76:fb:c0:42:3b:73:cd:d0:ad:bc:67:
        db:6b:24:b1:0f:b8:40:be:3f:79:07:9b:4a:b7:12:ae:
        1c:c4:e1:52:aa:13:dc:58:49:aa:19:ce:47:3e:89:36
    Fingerprint (MD5):
        93:D5:3D:1D:19:2B:31:79:75:FC:F5:17:C9:B4:78:03
    Fingerprint (SHA1):
        C8:61:49:8F:55:17:85:14:DF:A5:48:95:39:FE:8B:06:01:DE:C3:E8

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #6600: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6601: AIA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191719 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6602: AIA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6603: AIA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6604: AIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6605: AIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127191720   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6606: AIA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #6607: AIA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6608: AIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6609: AIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127191721   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA1Root-1127191629.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #6610: AIA: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #6611: AIA: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #6612: AIA: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6613: AIA: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1127191722   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6614: AIA: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #6615: AIA: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB     -t Root.der
vfychain -d UserDB -pp -vv      UserCA2.der CA2CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA1 Intermediate,O=CA1,C=US
Returned value is 1, expected result is fail
chains.sh: #6616: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB -f    -t Root.der
vfychain -d UserDB -pp -vv  -f    UserCA2.der CA2CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191719 (0x432f94a7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:17:00 2012
            Not After : Tue Nov 28 00:17:00 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c9:dd:88:76:fa:7a:b9:e6:e2:9d:6d:42:17:e2:83:16:
                    a4:20:3e:95:86:74:49:6c:a7:6e:9f:72:d2:cb:c3:b2:
                    fd:22:5c:b7:13:10:60:a8:32:50:28:bf:26:87:bf:8a:
                    4b:28:42:0c:ac:76:d9:22:5c:a5:8e:41:f0:3f:dd:48:
                    d7:ba:b5:31:a0:5d:52:0c:78:81:2a:80:c8:f6:12:49:
                    2c:f1:3c:19:8f:70:8a:f2:9d:f8:4d:b4:c2:79:2b:41:
                    7c:8e:29:54:7a:21:e3:7c:94:07:85:be:ff:ae:56:6d:
                    c0:69:92:ab:ec:70:e8:14:ee:82:a6:34:5c:75:95:55
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0c:e7:ab:63:8a:24:b4:74:58:25:5c:ad:2c:cd:dd:b8:
        aa:f2:99:76:ec:7b:5b:10:b2:df:f6:98:03:d6:dc:6a:
        dd:e8:d6:75:7d:99:b9:70:fb:8d:c1:50:82:11:d1:90:
        17:b7:33:2a:ba:bb:1e:30:fe:35:cf:37:bf:28:ca:14:
        89:7e:58:9f:1a:97:7c:e9:8b:3f:af:fc:9d:aa:6c:56:
        c3:c2:1f:ae:21:8f:40:cb:c9:fe:a7:93:4a:db:e4:96:
        eb:9a:86:4a:79:40:25:07:7b:59:7d:f4:2c:b2:4f:98:
        7c:09:da:35:52:55:47:29:5c:c4:39:0e:b6:bf:84:6a
    Fingerprint (MD5):
        FE:C3:C3:C7:18:05:0F:9A:1D:3D:B3:E8:E3:BE:BE:1D
    Fingerprint (SHA1):
        84:4A:C2:C6:94:37:A3:A6:24:FD:26:55:7B:E2:10:2B:28:07:FE:74


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6617: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB -f    -t Root.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #6618: BridgeWithAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191723 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6619: BridgeWithAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #6620: BridgeWithAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #6621: BridgeWithAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191724 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6622: BridgeWithAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #6623: BridgeWithAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #6624: BridgeWithAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o BridgeReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6625: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1127191725 -7 Bridge@Army  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6626: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #6627: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1127191726 -7 Bridge@Navy  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6628: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #6629: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #6630: BridgeWithAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6631: BridgeWithAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6632: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1127191727   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-Bridge-1127191630.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #6633: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #6634: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #6635: BridgeWithAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6636: BridgeWithAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127191728   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6637: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #6638: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #6639: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #6640: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191724 (0x432f94ac)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:17:01 2012
            Not After : Tue Nov 28 00:17:01 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:63:75:d1:58:1a:8c:ce:d6:c7:a1:bc:65:30:da:4f:
                    d3:88:6d:c8:04:20:ba:74:9c:4b:d7:35:7e:a1:0c:cb:
                    9e:79:04:4e:06:06:35:8d:de:2a:d1:b6:21:27:16:68:
                    89:40:a0:c0:fd:38:86:90:cc:81:02:12:66:ce:fe:21:
                    eb:39:0c:c8:69:77:1d:5d:13:28:97:7c:09:e7:20:24:
                    30:6a:5a:51:e3:9c:40:75:92:60:6a:ba:60:5b:b2:a6:
                    e8:bd:27:8d:1b:c3:d9:0f:77:93:12:dd:66:95:c4:25:
                    ba:01:1c:68:e9:cd:d1:ec:82:65:0c:0e:87:cc:ba:0f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b9:74:fd:1e:88:3f:ca:c1:b2:e5:7b:ed:7f:10:d8:84:
        02:0a:98:7c:f2:d3:11:22:68:79:57:cb:bd:ec:43:24:
        18:a6:6f:a5:9d:30:73:1f:54:45:aa:94:52:eb:4c:af:
        9f:2e:23:12:87:cf:83:f4:ee:5c:15:27:76:b3:2b:d7:
        f0:cf:ba:11:80:3e:92:5f:ed:a8:7c:01:f3:58:23:16:
        1b:c7:cc:b2:24:a9:2c:38:28:68:00:64:15:b9:2f:8d:
        b8:6c:cb:df:09:e0:51:c6:42:2e:e0:f9:81:bb:bb:2e:
        08:6e:10:b1:16:a3:c1:8e:e3:7f:77:30:1a:d3:06:52
    Fingerprint (MD5):
        AA:01:EC:70:F6:2B:B6:91:71:44:15:DC:70:9B:5C:B3
    Fingerprint (SHA1):
        BA:80:80:C5:0B:E3:8F:61:19:3A:25:39:08:08:67:D3:5D:E3:DF:6C


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6641: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191724 (0x432f94ac)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:17:01 2012
            Not After : Tue Nov 28 00:17:01 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:63:75:d1:58:1a:8c:ce:d6:c7:a1:bc:65:30:da:4f:
                    d3:88:6d:c8:04:20:ba:74:9c:4b:d7:35:7e:a1:0c:cb:
                    9e:79:04:4e:06:06:35:8d:de:2a:d1:b6:21:27:16:68:
                    89:40:a0:c0:fd:38:86:90:cc:81:02:12:66:ce:fe:21:
                    eb:39:0c:c8:69:77:1d:5d:13:28:97:7c:09:e7:20:24:
                    30:6a:5a:51:e3:9c:40:75:92:60:6a:ba:60:5b:b2:a6:
                    e8:bd:27:8d:1b:c3:d9:0f:77:93:12:dd:66:95:c4:25:
                    ba:01:1c:68:e9:cd:d1:ec:82:65:0c:0e:87:cc:ba:0f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b9:74:fd:1e:88:3f:ca:c1:b2:e5:7b:ed:7f:10:d8:84:
        02:0a:98:7c:f2:d3:11:22:68:79:57:cb:bd:ec:43:24:
        18:a6:6f:a5:9d:30:73:1f:54:45:aa:94:52:eb:4c:af:
        9f:2e:23:12:87:cf:83:f4:ee:5c:15:27:76:b3:2b:d7:
        f0:cf:ba:11:80:3e:92:5f:ed:a8:7c:01:f3:58:23:16:
        1b:c7:cc:b2:24:a9:2c:38:28:68:00:64:15:b9:2f:8d:
        b8:6c:cb:df:09:e0:51:c6:42:2e:e0:f9:81:bb:bb:2e:
        08:6e:10:b1:16:a3:c1:8e:e3:7f:77:30:1a:d3:06:52
    Fingerprint (MD5):
        AA:01:EC:70:F6:2B:B6:91:71:44:15:DC:70:9B:5C:B3
    Fingerprint (SHA1):
        BA:80:80:C5:0B:E3:8F:61:19:3A:25:39:08:08:67:D3:5D:E3:DF:6C


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6642: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #6643: BridgeWithHalfAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191729 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6644: BridgeWithHalfAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #6645: BridgeWithHalfAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #6646: BridgeWithHalfAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191730 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6647: BridgeWithHalfAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #6648: BridgeWithHalfAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #6649: BridgeWithHalfAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o BridgeReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6650: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1127191731 -7 Bridge@Army  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6651: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #6652: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1127191732 -7 Bridge@Navy  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6653: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #6654: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #6655: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6656: BridgeWithHalfAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6657: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1127191733   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-Bridge-1127191631.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #6658: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #6659: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #6660: BridgeWithHalfAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6661: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127191734   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6662: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #6663: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6664: BridgeWithHalfAIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6665: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1127191735   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-BridgeNavy-1127191632.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #6666: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
chains.sh: #6667: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #6668: BridgeWithHalfAIA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6669: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1127191736   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6670: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #6671: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #6672: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #6673: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191730 (0x432f94b2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:17:03 2012
            Not After : Tue Nov 28 00:17:03 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e9:a0:93:f3:17:bb:80:8f:86:4d:15:bd:85:c8:fe:b2:
                    dc:ab:60:7f:5a:35:a5:12:b3:85:7f:1f:09:5e:14:f8:
                    17:d1:1c:ce:4b:f2:6e:f4:81:89:38:15:47:27:f1:8e:
                    9d:f5:c4:c6:e7:f8:0a:72:bc:bc:57:5a:a6:c0:2e:d8:
                    f4:b7:b9:1d:ce:a3:82:b8:62:16:49:7e:14:e9:ff:cb:
                    73:e6:4b:2c:87:91:02:87:5c:c3:93:a3:58:22:70:7d:
                    47:37:db:37:32:50:b3:e3:88:0b:fe:96:cf:90:0d:26:
                    4d:e6:93:7b:04:c1:90:57:7b:64:bf:7c:ac:24:cd:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        e9:11:12:42:ae:3b:37:aa:45:ea:4b:f2:9f:6f:c0:ed:
        e5:bd:14:33:7f:f3:b7:10:89:39:5d:ad:a4:50:70:65:
        cf:b9:e4:17:4d:b4:2a:ce:93:22:83:c9:f5:1e:96:73:
        55:03:70:58:18:4e:3f:0e:e0:c1:87:55:eb:37:52:8d:
        02:b3:90:99:8a:18:44:35:6f:bf:92:f2:01:06:c9:74:
        58:c1:62:05:b0:0f:a2:42:99:7c:bc:5c:f7:49:fd:40:
        9b:2f:cc:14:cb:de:e7:ed:20:c5:84:dc:94:bd:e8:57:
        36:f4:02:79:0d:a4:f0:fd:35:d2:62:1b:48:b2:d2:91
    Fingerprint (MD5):
        87:46:62:41:26:2A:9E:01:6E:B1:13:C5:7B:A3:F8:5F
    Fingerprint (SHA1):
        E5:87:FD:20:6B:F1:AF:A5:7C:A7:73:16:AD:AF:C9:3B:C8:7C:12:6A


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6674: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191730 (0x432f94b2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:17:03 2012
            Not After : Tue Nov 28 00:17:03 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e9:a0:93:f3:17:bb:80:8f:86:4d:15:bd:85:c8:fe:b2:
                    dc:ab:60:7f:5a:35:a5:12:b3:85:7f:1f:09:5e:14:f8:
                    17:d1:1c:ce:4b:f2:6e:f4:81:89:38:15:47:27:f1:8e:
                    9d:f5:c4:c6:e7:f8:0a:72:bc:bc:57:5a:a6:c0:2e:d8:
                    f4:b7:b9:1d:ce:a3:82:b8:62:16:49:7e:14:e9:ff:cb:
                    73:e6:4b:2c:87:91:02:87:5c:c3:93:a3:58:22:70:7d:
                    47:37:db:37:32:50:b3:e3:88:0b:fe:96:cf:90:0d:26:
                    4d:e6:93:7b:04:c1:90:57:7b:64:bf:7c:ac:24:cd:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        e9:11:12:42:ae:3b:37:aa:45:ea:4b:f2:9f:6f:c0:ed:
        e5:bd:14:33:7f:f3:b7:10:89:39:5d:ad:a4:50:70:65:
        cf:b9:e4:17:4d:b4:2a:ce:93:22:83:c9:f5:1e:96:73:
        55:03:70:58:18:4e:3f:0e:e0:c1:87:55:eb:37:52:8d:
        02:b3:90:99:8a:18:44:35:6f:bf:92:f2:01:06:c9:74:
        58:c1:62:05:b0:0f:a2:42:99:7c:bc:5c:f7:49:fd:40:
        9b:2f:cc:14:cb:de:e7:ed:20:c5:84:dc:94:bd:e8:57:
        36:f4:02:79:0d:a4:f0:fd:35:d2:62:1b:48:b2:d2:91
    Fingerprint (MD5):
        87:46:62:41:26:2A:9E:01:6E:B1:13:C5:7B:A3:F8:5F
    Fingerprint (SHA1):
        E5:87:FD:20:6B:F1:AF:A5:7C:A7:73:16:AD:AF:C9:3B:C8:7C:12:6A


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6675: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der BridgeArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=EE2 EE,O=EE2,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA2 Intermediate,O=CA2,C=US
Returned value is 1, expected result is fail
chains.sh: #6676: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191729 (0x432f94b1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 00:17:03 2012
            Not After : Tue Nov 28 00:17:03 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:63:cb:c8:a2:08:d2:7a:5e:48:b4:5c:a4:bd:8d:87:
                    77:f7:90:c6:3e:85:1e:86:f1:84:39:61:e9:c2:1b:64:
                    a1:b3:21:45:1a:5b:d2:f4:73:45:74:11:c5:0c:2e:eb:
                    b2:46:5f:e2:b7:2a:a9:f8:09:5a:58:d9:c6:c2:70:49:
                    58:c6:7a:72:99:cd:d7:56:9d:7b:bc:44:cc:e5:79:64:
                    f3:b2:fd:94:c9:67:af:3e:c9:15:9f:99:9e:ff:bf:7c:
                    f1:61:15:8e:38:73:0b:89:03:46:51:82:3c:74:4c:1f:
                    39:b4:71:2b:ac:ef:78:35:13:fd:86:5f:e5:94:21:57
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        14:05:15:0b:99:29:43:12:42:37:f7:fb:01:21:d1:8f:
        68:b5:66:98:0c:35:4f:ed:e4:64:27:54:40:ed:35:11:
        b9:8d:62:8f:19:db:84:43:27:c7:bd:55:ce:1c:13:e6:
        fa:08:cb:13:ea:5c:a8:7b:b1:2c:e6:90:5f:26:54:7e:
        07:87:5c:19:1f:3f:ec:0a:d1:9a:5b:2b:69:9a:32:73:
        20:9d:df:c3:ad:a0:eb:c1:73:39:4b:3b:51:90:21:fc:
        6c:7f:8c:8e:bd:82:9b:d0:a2:5c:7a:d6:30:08:cd:75:
        d6:b6:bb:e3:a0:51:eb:7d:82:32:0d:4c:a3:e0:aa:7c
    Fingerprint (MD5):
        DD:6A:C3:7C:11:05:65:71:3B:E5:58:0B:87:B2:F1:34
    Fingerprint (SHA1):
        44:A3:A3:79:B1:5D:C5:CC:31:88:3D:A9:6A:A2:4B:D3:1D:8D:32:AC


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6677: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191730 (0x432f94b2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:17:03 2012
            Not After : Tue Nov 28 00:17:03 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e9:a0:93:f3:17:bb:80:8f:86:4d:15:bd:85:c8:fe:b2:
                    dc:ab:60:7f:5a:35:a5:12:b3:85:7f:1f:09:5e:14:f8:
                    17:d1:1c:ce:4b:f2:6e:f4:81:89:38:15:47:27:f1:8e:
                    9d:f5:c4:c6:e7:f8:0a:72:bc:bc:57:5a:a6:c0:2e:d8:
                    f4:b7:b9:1d:ce:a3:82:b8:62:16:49:7e:14:e9:ff:cb:
                    73:e6:4b:2c:87:91:02:87:5c:c3:93:a3:58:22:70:7d:
                    47:37:db:37:32:50:b3:e3:88:0b:fe:96:cf:90:0d:26:
                    4d:e6:93:7b:04:c1:90:57:7b:64:bf:7c:ac:24:cd:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        e9:11:12:42:ae:3b:37:aa:45:ea:4b:f2:9f:6f:c0:ed:
        e5:bd:14:33:7f:f3:b7:10:89:39:5d:ad:a4:50:70:65:
        cf:b9:e4:17:4d:b4:2a:ce:93:22:83:c9:f5:1e:96:73:
        55:03:70:58:18:4e:3f:0e:e0:c1:87:55:eb:37:52:8d:
        02:b3:90:99:8a:18:44:35:6f:bf:92:f2:01:06:c9:74:
        58:c1:62:05:b0:0f:a2:42:99:7c:bc:5c:f7:49:fd:40:
        9b:2f:cc:14:cb:de:e7:ed:20:c5:84:dc:94:bd:e8:57:
        36:f4:02:79:0d:a4:f0:fd:35:d2:62:1b:48:b2:d2:91
    Fingerprint (MD5):
        87:46:62:41:26:2A:9E:01:6E:B1:13:C5:7B:A3:F8:5F
    Fingerprint (SHA1):
        E5:87:FD:20:6B:F1:AF:A5:7C:A7:73:16:AD:AF:C9:3B:C8:7C:12:6A


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6678: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191730 (0x432f94b2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:17:03 2012
            Not After : Tue Nov 28 00:17:03 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e9:a0:93:f3:17:bb:80:8f:86:4d:15:bd:85:c8:fe:b2:
                    dc:ab:60:7f:5a:35:a5:12:b3:85:7f:1f:09:5e:14:f8:
                    17:d1:1c:ce:4b:f2:6e:f4:81:89:38:15:47:27:f1:8e:
                    9d:f5:c4:c6:e7:f8:0a:72:bc:bc:57:5a:a6:c0:2e:d8:
                    f4:b7:b9:1d:ce:a3:82:b8:62:16:49:7e:14:e9:ff:cb:
                    73:e6:4b:2c:87:91:02:87:5c:c3:93:a3:58:22:70:7d:
                    47:37:db:37:32:50:b3:e3:88:0b:fe:96:cf:90:0d:26:
                    4d:e6:93:7b:04:c1:90:57:7b:64:bf:7c:ac:24:cd:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        e9:11:12:42:ae:3b:37:aa:45:ea:4b:f2:9f:6f:c0:ed:
        e5:bd:14:33:7f:f3:b7:10:89:39:5d:ad:a4:50:70:65:
        cf:b9:e4:17:4d:b4:2a:ce:93:22:83:c9:f5:1e:96:73:
        55:03:70:58:18:4e:3f:0e:e0:c1:87:55:eb:37:52:8d:
        02:b3:90:99:8a:18:44:35:6f:bf:92:f2:01:06:c9:74:
        58:c1:62:05:b0:0f:a2:42:99:7c:bc:5c:f7:49:fd:40:
        9b:2f:cc:14:cb:de:e7:ed:20:c5:84:dc:94:bd:e8:57:
        36:f4:02:79:0d:a4:f0:fd:35:d2:62:1b:48:b2:d2:91
    Fingerprint (MD5):
        87:46:62:41:26:2A:9E:01:6E:B1:13:C5:7B:A3:F8:5F
    Fingerprint (SHA1):
        E5:87:FD:20:6B:F1:AF:A5:7C:A7:73:16:AD:AF:C9:3B:C8:7C:12:6A


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #6679: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #6680: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191737 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6681: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #6682: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #6683: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191738 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6684: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #6685: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB CAArmyDB
certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd
chains.sh: #6686: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CAArmyReq.der
certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US"  -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CAArmyReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6687: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der  - PASSED
chains.sh: Creating certficate CAArmyArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1127191739   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6688: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army  - PASSED
chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database
certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der
chains.sh: #6689: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database  - PASSED
chains.sh: Creating DB CANavyDB
certutil -N -d CANavyDB -f CANavyDB/dbpasswd
chains.sh: #6690: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CANavyReq.der
certutil -s "CN=CANavy Intermediate, O=CANavy, C=US"  -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CANavyReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6691: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der  - PASSED
chains.sh: Creating certficate CANavyNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1127191740   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6692: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate CANavyNavy.der to CANavyDB database
certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der
chains.sh: #6693: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #6694: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o BridgeReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6695: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy
certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1127191741 -7 Bridge@CAArmy  --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n
OID.1.1
OID.2.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #6696: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy  - PASSED
chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der
chains.sh: #6697: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeCANavy.der signed by CANavy
certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1127191742 -7 Bridge@CANavy  --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n
OID.2.1
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #6698: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy  - PASSED
chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der
chains.sh: #6699: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7
chains.sh: #6700: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6701: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6702: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1127191743   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.1
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6703: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #6704: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6705: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6706: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1127191744   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6707: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
chains.sh: #6708: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #6709: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6710: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127191745   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6711: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #6712: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #6713: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6714: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1127191746   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6715: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #6716: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der
vfychain  -pp -vv     -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6717: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der
vfychain  -pp -vv     -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191737 (0x432f94b9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 00:17:06 2012
            Not After : Tue Nov 28 00:17:06 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e4:e4:c7:19:88:ad:8b:84:fd:04:75:00:3d:0f:65:8d:
                    2a:d5:83:bc:68:37:c4:0b:e5:de:20:16:35:91:f1:e7:
                    37:1f:35:23:0a:7a:67:80:fa:18:ae:d2:37:a7:ca:c7:
                    f5:ad:10:93:88:b3:26:2f:d2:c4:ee:7f:c0:27:40:e7:
                    87:3f:3c:7c:cb:02:1c:39:b6:1d:9f:e6:d3:f9:38:fc:
                    22:59:9d:0b:72:dc:7a:a2:ad:75:0b:fa:30:87:28:4c:
                    81:9b:0f:cb:55:8f:22:db:6d:14:65:4e:f8:0a:af:3c:
                    5e:81:58:3a:51:22:72:df:2c:56:0b:8a:fc:78:eb:3b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        15:f6:7e:1c:1a:e8:85:27:10:f4:f0:42:f6:df:ea:a6:
        5a:eb:82:a1:c8:52:d6:bd:ad:39:b9:37:8c:a5:bb:6f:
        2f:b8:51:e1:cd:5e:a9:1f:f3:48:80:dd:16:60:77:58:
        a3:d4:9f:fa:cf:77:a1:8f:fb:3d:af:8d:4d:bb:e9:54:
        9d:52:0f:80:9f:a3:70:38:d4:ef:b7:e4:9e:6c:52:34:
        70:ca:71:c8:30:5b:4d:00:7e:12:c9:70:f6:96:fc:2a:
        e3:a6:25:08:5e:79:d8:99:3a:9b:bb:28:9a:92:2d:46:
        8e:6d:c0:2f:71:df:0e:25:62:dc:a9:c0:05:02:f6:cb
    Fingerprint (MD5):
        FF:39:F6:36:19:77:64:E4:4D:45:8E:59:E5:BD:1E:C5
    Fingerprint (SHA1):
        1F:B7:CA:95:63:77:CB:4D:94:FD:87:6F:DE:62:01:27:ED:1C:88:08


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US"
Returned value is 0, expected result is pass
chains.sh: #6718: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der
vfychain  -pp -vv     -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6719: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der
vfychain  -pp -vv     -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6720: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der
vfychain  -pp -vv     -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6721: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der
vfychain  -pp -vv     -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6722: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der
vfychain  -pp -vv     -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6723: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der
vfychain  -pp -vv     -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6724: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der
vfychain  -pp -vv     -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6725: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der
vfychain  -pp -vv     -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6726: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der
vfychain  -pp -vv     -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191738 (0x432f94ba)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:17:06 2012
            Not After : Tue Nov 28 00:17:06 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ab:7c:4f:3a:f3:a6:33:af:96:2e:1c:27:76:42:fb:54:
                    a3:bc:90:2f:6b:9e:6c:65:c2:85:be:dc:b0:1c:a0:9d:
                    a3:a2:76:24:1d:01:a8:34:6c:1b:b0:08:32:3d:4e:a8:
                    95:95:d9:43:1b:7e:ad:d6:30:1c:97:a4:97:0a:35:6d:
                    e8:88:26:a7:62:d3:16:27:f5:0e:98:b6:a0:0c:5a:9d:
                    52:8e:b2:52:4d:47:4d:ea:ab:cd:26:40:95:ed:96:7f:
                    33:ef:6c:9f:2d:f6:c5:10:7a:25:14:79:ab:b1:ab:f1:
                    21:e8:bf:da:cd:d2:de:6a:ee:f6:d5:e5:52:74:8f:8f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3e:6b:7d:d0:c2:ad:b4:bd:5d:68:bc:b3:6c:fc:ab:0a:
        93:20:cf:c4:7a:60:9e:a1:f8:11:27:22:16:55:dd:be:
        81:dc:75:4c:cb:8a:e2:61:c3:45:d5:09:4b:b0:da:9c:
        82:7e:84:27:df:19:52:d9:f5:bc:19:e7:e4:fb:29:93:
        c7:af:a2:0f:1b:63:19:86:71:5b:0c:99:73:f8:30:ec:
        79:d7:57:03:9e:92:8d:77:67:c0:d1:98:5c:5f:c5:4a:
        7f:f2:c9:33:2f:25:fe:9b:f8:c5:d0:97:1c:69:54:58:
        65:d6:6c:c0:d7:41:d9:16:c8:15:2e:e3:2b:2a:25:eb
    Fingerprint (MD5):
        EF:B0:AC:7C:8C:95:12:9E:BB:59:30:F3:BA:10:B5:B0
    Fingerprint (SHA1):
        8B:A7:9C:9E:AA:D3:6A:7B:FB:C0:B4:15:51:07:E2:C5:A4:AF:81:38


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US"
Returned value is 0, expected result is pass
chains.sh: #6727: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der
vfychain  -pp -vv     -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6728: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der
vfychain  -pp -vv     -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6729: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der
vfychain  -pp -vv     -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6730: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der
vfychain  -pp -vv     -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6731: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der
vfychain  -pp -vv     -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #6732: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6733: RealCerts: Creating DB AllDB  - PASSED
chains.sh: Importing certificate TestCA.ca.cert to AllDB database
certutil -A -n TestCA.ca  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/TestCA.ca.cert
chains.sh: #6734: RealCerts: Importing certificate TestCA.ca.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser50.cert to AllDB database
certutil -A -n TestUser50  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert
chains.sh: #6735: RealCerts: Importing certificate TestUser50.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser51.cert to AllDB database
certutil -A -n TestUser51  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert
chains.sh: #6736: RealCerts: Importing certificate TestUser51.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalRootCA.cert to AllDB database
certutil -A -n PayPalRootCA  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/PayPalRootCA.cert
chains.sh: #6737: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalICA.cert to AllDB database
certutil -A -n PayPalICA  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/PayPalICA.cert
chains.sh: #6738: RealCerts: Importing certificate PayPalICA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalEE.cert to AllDB database
certutil -A -n PayPalEE  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert
chains.sh: #6739: RealCerts: Importing certificate PayPalEE.cert to AllDB database  - PASSED
chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database
certutil -A -n BrAirWaysBadSig  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert
chains.sh: #6740: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  TestUser50.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Mar 19 21:04:25 2008
            Not After : Tue Mar 19 21:04:25 2058
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61:
                    fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82:
                    9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae:
                    c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03:
                    a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0:
                    a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b:
                    2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9:
                    aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e:
        0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18:
        57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc:
        58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38:
        5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62:
        57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55:
        0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a:
        f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7
    Fingerprint (MD5):
        35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27
    Fingerprint (SHA1):
        52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #6741: RealCerts: Verifying certificate(s)  TestUser50.cert with flags  -d AllDB     - PASSED
chains.sh: Verifying certificate(s)  TestUser51.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Mar 19 21:04:25 2008
            Not After : Tue Mar 19 21:04:25 2058
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61:
                    fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82:
                    9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae:
                    c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03:
                    a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0:
                    a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b:
                    2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9:
                    aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e:
        0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18:
        57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc:
        58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38:
        5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62:
        57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55:
        0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a:
        f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7
    Fingerprint (MD5):
        35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27
    Fingerprint (SHA1):
        52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #6742: RealCerts: Verifying certificate(s)  TestUser51.cert with flags  -d AllDB     - PASSED
chains.sh: Verifying certificate(s)  PayPalEE.cert with flags  -d AllDB    -o OID.2.16.840.1.113733.1.7.23.6 
vfychain -d AllDB -pp -vv     -o OID.2.16.840.1.113733.1.7.23.6  /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            58:f3:9e:5c:01:2b:19:47:21:a9:8e:e4:ee:e0:f8:bf
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "OU=Class 3 Public Primary Certification Authority,O="VeriSig
            n, Inc.",C=US"
        Validity:
            Not Before: Wed Nov 08 00:00:00 2006
            Not After : Sun Nov 07 23:59:59 2021
        Subject: "CN=VeriSign Class 3 Public Primary Certification Authority 
            - G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve
            riSign Trust Network,O="VeriSign, Inc.",C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc:
                    7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64:
                    85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42:
                    b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec:
                    ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3:
                    62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b:
                    9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f:
                    e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db:
                    7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af:
                    1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a:
                    b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7:
                    ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74:
                    24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4:
                    8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95:
                    ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f:
                    73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: CRL Distribution Points
            Distribution point:
                URI: "http://crl.verisign.com/pca3.crl"

            Name: Certificate Key Usage
            Critical: True
            Usages: Certificate Signing
                    CRL Signing

            Name: OID.1.3.6.1.5.5.7.1.12
            Data: Sequence {
                [1]: {
                    [0]: {
                        Sequence {
                            Sequence {
                                Sequence {
                                    "image/gif"
                                    Sequence {
                                        Sequence {
                                            Sequence {
                                                SHA-1
                                            }
                                            8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf:
                                            80:6a:d4:48:18:2c:7b:19:2e
                                        }
                                    }
                                    Sequence {
                                        "http://logo.verisign.com/vslogo.gif"
                                    }
                                }
                            }
                        }
                    }
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: Certificate Policies AnyPolicy
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                    Policy Qualifier Data: "https://www.verisign.com/cps"

            Name: Certificate Subject Key ID
            Data:
                7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02:
                af:33:31:33

            Name: Certificate Authority Key Identifier
            Issuer: 
                Directory Name: "OU=Class 3 Public Primary Certification Auth
                    ority,O="VeriSign, Inc.",C=US"
            Serial Number:
                70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:15:49:5e:6b:26:ce:ee:98:e7:4d:a5:92:3f:75:6a:
        f0:33:0b:fa:09:dc:28:92:ab:8d:6a:31:41:d9:47:31:
        47:46:09:a1:39:05:3e:66:65:19:8b:32:bf:61:2c:1c:
        d5:6a:03:6f:44:dc:3b:af:ef:1b:93:58:d6:bd:ce:d0:
        ed:b6:89:77:51:15:59:32:28:c5:7a:89:8c:da:3e:6d:
        5c:75:ac:86:d4:c7:9e:fd:38:3e:96:73:40:87:34:6a:
        84:4e:31:a8:d2:a2:b9:3c:4e:06:dd:cb:b2:7c:ae:e1:
        d5:9f:1e:74:e5:24:f0:cf:e4:9b:ec:25:ea:cd:ec:f6
    Fingerprint (MD5):
        C8:DE:26:6F:0A:C4:1C:6D:46:9C:CC:AD:0A:C4:D5:1C
    Fingerprint (SHA1):
        87:50:7F:E5:19:BD:E7:A1:19:AE:A3:2F:77:9D:76:30:5D:7A:69:13

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=www.paypal.com,OU=PayPal Production,O="PayPal, Inc
    .",STREET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C=
    US,serialNumber=3014267,businessCategory=Private Organization,incorporati
    onState=Delaware,incorporationCountry=US"
Certificate 2 Subject: "CN=VeriSign Class 3 Extended Validation SSL CA,OU=Ter
    ms of use at https://www.verisign.com/rpa (c)06,OU=VeriSign Trust Network
    ,O="VeriSign, Inc.",C=US"
Returned value is 0, expected result is pass
chains.sh: #6743: RealCerts: Verifying certificate(s)  PayPalEE.cert with flags  -d AllDB    -o OID.2.16.840.1.113733.1.7.23.6  - PASSED
chains.sh: Verifying certificate(s)  BrAirWaysBadSig.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. BrAirWaysBadSig :
  ERROR -8181: Peer's Certificate has expired.
Returned value is 1, expected result is fail
chains.sh: #6744: RealCerts: Verifying certificate(s)  BrAirWaysBadSig.cert with flags  -d AllDB     - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6745: DSA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191747 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6746: DSA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6747: DSA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6748: DSA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6749: DSA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127191748   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6750: DSA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #6751: DSA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #6752: DSA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6753: DSA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127191749   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6754: DSA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #6755: DSA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6756: DSA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6757: DSA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1127191750   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6758: DSA: Creating certficate CA2Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA2Root.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der
chains.sh: #6759: DSA: Importing certificate CA2Root.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #6760: DSA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6761: DSA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1127191751   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6762: DSA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #6763: DSA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #6764: DSA: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6765: DSA: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1127191752   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6766: DSA: Creating certficate CA3Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA3Root.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der
chains.sh: #6767: DSA: Importing certificate CA3Root.der to CA3DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #6768: DSA: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R  -d EE3DB -f EE3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6769: DSA: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1127191753   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6770: DSA: Creating certficate EE3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate EE3CA3.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der
chains.sh: #6771: DSA: Importing certificate EE3CA3.der to EE3DB database  - PASSED
chains.sh: Creating DB CA4DB
certutil -N -d CA4DB -f CA4DB/dbpasswd
chains.sh: #6772: DSA: Creating DB CA4DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA4Req.der
certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA4Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6773: DSA: Creating Intermediate certifiate request CA4Req.der  - PASSED
chains.sh: Creating certficate CA4Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1127191754   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6774: DSA: Creating certficate CA4Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA4Root.der to CA4DB database
certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der
chains.sh: #6775: DSA: Importing certificate CA4Root.der to CA4DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #6776: DSA: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R  -d EE4DB -f EE4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE4Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6777: DSA: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA4.der signed by CA4
certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1127191755   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6778: DSA: Creating certficate EE4CA4.der signed by CA4  - PASSED
chains.sh: Importing certificate EE4CA4.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der
chains.sh: #6779: DSA: Importing certificate EE4CA4.der to EE4DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6780: DSA: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE1CA1.der CA1Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191747 (0x432f94c3)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:17:11 2012
            Not After : Tue Nov 28 00:17:11 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    12:c8:84:e2:2f:79:f5:8f:f5:e9:21:27:dc:27:d5:a8:
                    ae:90:63:8d:f8:25:ae:29:06:c4:b7:f8:f3:40:cd:d3:
                    69:5a:24:29:7e:bc:b3:03:05:d7:c7:e3:71:d5:ea:da:
                    4b:21:7a:f2:f0:48:f3:ec:f1:3a:21:34:f4:9f:f7:c6:
                    46:0f:29:c6:eb:86:5b:c1:1b:e7:70:50:9e:b9:f5:37:
                    55:9d:cb:80:97:9b:35:b6:f2:92:79:3b:e8:81:30:db:
                    21:bb:e1:83:e8:85:9a:7d:d7:36:a8:bb:70:2c:87:3a:
                    99:34:0e:47:59:ba:a5:f1:eb:79:52:af:19:dc:1d:cf
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2c:02:14:4c:02:4c:df:be:b9:5a:31:29:ec:11:04:
        cf:ab:d4:fe:be:a3:b4:2c:02:14:03:ac:36:b0:97:8c:
        ea:e3:64:41:34:5a:da:8b:7c:6c:17:18:ba:88
    Fingerprint (MD5):
        EC:83:B8:EC:8C:78:20:2E:AD:9C:66:99:BE:00:2C:D0
    Fingerprint (SHA1):
        8E:69:D8:19:BD:59:54:AB:F1:E5:87:E8:DB:94:C0:33:51:82:3B:8E


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6781: DSA: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE2CA2.der CA2Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191747 (0x432f94c3)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:17:11 2012
            Not After : Tue Nov 28 00:17:11 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    12:c8:84:e2:2f:79:f5:8f:f5:e9:21:27:dc:27:d5:a8:
                    ae:90:63:8d:f8:25:ae:29:06:c4:b7:f8:f3:40:cd:d3:
                    69:5a:24:29:7e:bc:b3:03:05:d7:c7:e3:71:d5:ea:da:
                    4b:21:7a:f2:f0:48:f3:ec:f1:3a:21:34:f4:9f:f7:c6:
                    46:0f:29:c6:eb:86:5b:c1:1b:e7:70:50:9e:b9:f5:37:
                    55:9d:cb:80:97:9b:35:b6:f2:92:79:3b:e8:81:30:db:
                    21:bb:e1:83:e8:85:9a:7d:d7:36:a8:bb:70:2c:87:3a:
                    99:34:0e:47:59:ba:a5:f1:eb:79:52:af:19:dc:1d:cf
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2c:02:14:4c:02:4c:df:be:b9:5a:31:29:ec:11:04:
        cf:ab:d4:fe:be:a3:b4:2c:02:14:03:ac:36:b0:97:8c:
        ea:e3:64:41:34:5a:da:8b:7c:6c:17:18:ba:88
    Fingerprint (MD5):
        EC:83:B8:EC:8C:78:20:2E:AD:9C:66:99:BE:00:2C:D0
    Fingerprint (SHA1):
        8E:69:D8:19:BD:59:54:AB:F1:E5:87:E8:DB:94:C0:33:51:82:3B:8E


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6782: DSA: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE3CA3.der CA3Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191747 (0x432f94c3)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:17:11 2012
            Not After : Tue Nov 28 00:17:11 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    12:c8:84:e2:2f:79:f5:8f:f5:e9:21:27:dc:27:d5:a8:
                    ae:90:63:8d:f8:25:ae:29:06:c4:b7:f8:f3:40:cd:d3:
                    69:5a:24:29:7e:bc:b3:03:05:d7:c7:e3:71:d5:ea:da:
                    4b:21:7a:f2:f0:48:f3:ec:f1:3a:21:34:f4:9f:f7:c6:
                    46:0f:29:c6:eb:86:5b:c1:1b:e7:70:50:9e:b9:f5:37:
                    55:9d:cb:80:97:9b:35:b6:f2:92:79:3b:e8:81:30:db:
                    21:bb:e1:83:e8:85:9a:7d:d7:36:a8:bb:70:2c:87:3a:
                    99:34:0e:47:59:ba:a5:f1:eb:79:52:af:19:dc:1d:cf
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2c:02:14:4c:02:4c:df:be:b9:5a:31:29:ec:11:04:
        cf:ab:d4:fe:be:a3:b4:2c:02:14:03:ac:36:b0:97:8c:
        ea:e3:64:41:34:5a:da:8b:7c:6c:17:18:ba:88
    Fingerprint (MD5):
        EC:83:B8:EC:8C:78:20:2E:AD:9C:66:99:BE:00:2C:D0
    Fingerprint (SHA1):
        8E:69:D8:19:BD:59:54:AB:F1:E5:87:E8:DB:94:C0:33:51:82:3B:8E


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #6783: DSA: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE4CA4.der CA4Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191747 (0x432f94c3)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:17:11 2012
            Not After : Tue Nov 28 00:17:11 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    12:c8:84:e2:2f:79:f5:8f:f5:e9:21:27:dc:27:d5:a8:
                    ae:90:63:8d:f8:25:ae:29:06:c4:b7:f8:f3:40:cd:d3:
                    69:5a:24:29:7e:bc:b3:03:05:d7:c7:e3:71:d5:ea:da:
                    4b:21:7a:f2:f0:48:f3:ec:f1:3a:21:34:f4:9f:f7:c6:
                    46:0f:29:c6:eb:86:5b:c1:1b:e7:70:50:9e:b9:f5:37:
                    55:9d:cb:80:97:9b:35:b6:f2:92:79:3b:e8:81:30:db:
                    21:bb:e1:83:e8:85:9a:7d:d7:36:a8:bb:70:2c:87:3a:
                    99:34:0e:47:59:ba:a5:f1:eb:79:52:af:19:dc:1d:cf
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2c:02:14:4c:02:4c:df:be:b9:5a:31:29:ec:11:04:
        cf:ab:d4:fe:be:a3:b4:2c:02:14:03:ac:36:b0:97:8c:
        ea:e3:64:41:34:5a:da:8b:7c:6c:17:18:ba:88
    Fingerprint (MD5):
        EC:83:B8:EC:8C:78:20:2E:AD:9C:66:99:BE:00:2C:D0
    Fingerprint (SHA1):
        8E:69:D8:19:BD:59:54:AB:F1:E5:87:E8:DB:94:C0:33:51:82:3B:8E


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US"
Returned value is 0, expected result is pass
chains.sh: #6784: DSA: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6785: Revocation: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 10 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6786: Revocation: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6787: Revocation: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #6788: Revocation: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA0Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6789: Revocation: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6790: Revocation: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
chains.sh: #6791: Revocation: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6792: Revocation: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6793: Revocation: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6794: Revocation: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
chains.sh: #6795: Revocation: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #6796: Revocation: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE11Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6797: Revocation: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6798: Revocation: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
chains.sh: #6799: Revocation: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB EE12DB
certutil -N -d EE12DB -f EE12DB/dbpasswd
chains.sh: #6800: Revocation: Creating DB EE12DB  - PASSED
chains.sh: Creating EE certifiate request EE12Req.der
certutil -s "CN=EE12 EE, O=EE12, C=US"  -R  -d EE12DB -f EE12DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE12Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6801: Revocation: Creating EE certifiate request EE12Req.der  - PASSED
chains.sh: Creating certficate EE12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6802: Revocation: Creating certficate EE12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE12CA1.der to EE12DB database
certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der
chains.sh: #6803: Revocation: Importing certificate EE12CA1.der to EE12DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6804: Revocation: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6805: Revocation: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6806: Revocation: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
chains.sh: #6807: Revocation: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #6808: Revocation: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE21Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6809: Revocation: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6810: Revocation: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
chains.sh: #6811: Revocation: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20121128001715Z
nextupdate=20131128001715Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Wed Nov 28 00:17:15 2012
    Next Update: Thu Nov 28 00:17:15 2013
    CRL Extensions:
chains.sh: #6812: Revocation: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128001715Z
nextupdate=20131128001715Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 00:17:15 2012
    Next Update: Thu Nov 28 00:17:15 2013
    CRL Extensions:
chains.sh: #6813: Revocation: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128001715Z
nextupdate=20131128001715Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 00:17:15 2012
    Next Update: Thu Nov 28 00:17:15 2013
    CRL Extensions:
chains.sh: #6814: Revocation: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20121128001715Z
nextupdate=20131128001715Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Wed Nov 28 00:17:15 2012
    Next Update: Thu Nov 28 00:17:15 2013
    CRL Extensions:
chains.sh: #6815: Revocation: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 14 issued by CA1
crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128001716Z
addcert 14 20121128001716Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 00:17:16 2012
    Next Update: Thu Nov 28 00:17:15 2013
    Entry 1 (0x1):
        Serial Number: 14 (0xe)
        Revocation Date: Wed Nov 28 00:17:16 2012
    CRL Extensions:
chains.sh: #6816: Revocation: Revoking certificate with SN 14 issued by CA1  - PASSED
chains.sh: Revoking certificate with SN 15 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128001717Z
addcert 15 20121128001717Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 00:17:17 2012
    Next Update: Thu Nov 28 00:17:15 2013
    Entry 1 (0x1):
        Serial Number: 15 (0xf)
        Revocation Date: Wed Nov 28 00:17:17 2012
    CRL Extensions:
chains.sh: #6817: Revocation: Revoking certificate with SN 15 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6818: Revocation: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #6819: Revocation: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #6820: Revocation: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA0Root.der to AllDB database
certutil -A -n CA0  -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der
chains.sh: #6821: Revocation: Importing certificate CA0Root.der to AllDB database  - PASSED
chains.sh: Importing CRL CA0.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl
chains.sh: #6822: Revocation: Importing CRL CA0.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA1CA0.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der
chains.sh: #6823: Revocation: Importing certificate CA1CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA1.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl
chains.sh: #6824: Revocation: Importing CRL CA1.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA0.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der
chains.sh: #6825: Revocation: Importing certificate CA2CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA2.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl
chains.sh: #6826: Revocation: Importing CRL CA2.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:17:14 2012
            Not After : Tue Nov 28 00:17:14 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:54:22:09:2f:8a:40:80:a6:d2:55:f5:24:e7:7b:04:
                    c0:8b:6a:e1:77:74:2e:65:45:72:6a:f5:6f:dd:46:dc:
                    02:2d:25:e3:4b:e2:80:7a:c5:fe:17:46:55:73:b6:f2:
                    05:0d:60:7e:4f:83:26:04:e5:c6:ec:29:b7:57:31:8a:
                    ee:79:6a:e8:29:53:e0:be:af:19:5d:27:c3:f3:65:2c:
                    35:d4:e2:2b:85:d0:92:c3:df:4c:d1:84:63:10:bf:ec:
                    ef:29:31:8f:6d:f8:51:ef:a5:a7:fb:fd:01:3d:9e:0e:
                    8b:07:26:01:82:df:c0:85:00:ae:8f:a8:39:5b:0b:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:e6:b0:e0:e8:b8:35:4c:8b:42:f5:33:05:14:11:e0:
        f3:05:bc:c6:58:ad:02:de:d6:74:ea:98:ab:db:c7:63:
        4b:d8:43:22:80:de:a3:25:d9:64:84:3d:2e:e0:56:6a:
        71:17:05:d7:86:c5:9a:d5:4f:e8:35:9b:a1:da:db:8b:
        f3:20:f2:e7:dc:07:3d:e5:b7:ba:3e:5b:80:8c:b2:43:
        e0:46:56:b9:d6:e7:b3:3c:6a:fd:53:c1:48:4e:8f:50:
        f4:29:db:48:8f:80:53:b0:84:74:4e:f6:42:f3:8f:85:
        69:18:41:68:79:da:ea:ae:a5:0d:32:ea:9e:f5:0c:0c
    Fingerprint (MD5):
        B3:14:8D:AB:45:96:86:5A:CD:77:B9:75:F7:0C:0E:E6
    Fingerprint (SHA1):
        C9:05:33:73:4C:A9:20:04:59:82:07:42:4D:3F:16:75:83:F1:FB:81

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #6827: Revocation: Verifying certificate(s)  EE11CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE12CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -m crl     EE12CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6828: Revocation: Verifying certificate(s)  EE12CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags  -g chain -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g chain -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:17:14 2012
            Not After : Tue Nov 28 00:17:14 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c5:54:22:09:2f:8a:40:80:a6:d2:55:f5:24:e7:7b:04:
                    c0:8b:6a:e1:77:74:2e:65:45:72:6a:f5:6f:dd:46:dc:
                    02:2d:25:e3:4b:e2:80:7a:c5:fe:17:46:55:73:b6:f2:
                    05:0d:60:7e:4f:83:26:04:e5:c6:ec:29:b7:57:31:8a:
                    ee:79:6a:e8:29:53:e0:be:af:19:5d:27:c3:f3:65:2c:
                    35:d4:e2:2b:85:d0:92:c3:df:4c:d1:84:63:10:bf:ec:
                    ef:29:31:8f:6d:f8:51:ef:a5:a7:fb:fd:01:3d:9e:0e:
                    8b:07:26:01:82:df:c0:85:00:ae:8f:a8:39:5b:0b:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        3f:e6:b0:e0:e8:b8:35:4c:8b:42:f5:33:05:14:11:e0:
        f3:05:bc:c6:58:ad:02:de:d6:74:ea:98:ab:db:c7:63:
        4b:d8:43:22:80:de:a3:25:d9:64:84:3d:2e:e0:56:6a:
        71:17:05:d7:86:c5:9a:d5:4f:e8:35:9b:a1:da:db:8b:
        f3:20:f2:e7:dc:07:3d:e5:b7:ba:3e:5b:80:8c:b2:43:
        e0:46:56:b9:d6:e7:b3:3c:6a:fd:53:c1:48:4e:8f:50:
        f4:29:db:48:8f:80:53:b0:84:74:4e:f6:42:f3:8f:85:
        69:18:41:68:79:da:ea:ae:a5:0d:32:ea:9e:f5:0c:0c
    Fingerprint (MD5):
        B3:14:8D:AB:45:96:86:5A:CD:77:B9:75:F7:0C:0E:E6
    Fingerprint (SHA1):
        C9:05:33:73:4C:A9:20:04:59:82:07:42:4D:3F:16:75:83:F1:FB:81

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #6829: Revocation: Verifying certificate(s)  EE11CA1.der with flags  -g chain -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der with flags  -g chain -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g chain -m crl     EE21CA2.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6830: Revocation: Verifying certificate(s)  EE21CA2.der with flags  -g chain -m crl -d AllDB     -t Root.der - PASSED
chains.sh: #6831: Test that OCSP server is reachable - PASSED
chains.sh: Creating DB OCSPRootDB
certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd
chains.sh: #6832: OCSP: Creating DB OCSPRootDB  - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRootDB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #6833: OCSP: Importing certificate OCSPRoot.cert to OCSPRootDB database  - PASSED
chains.sh: Creating DB OCSPCA1DB
certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd
chains.sh: #6834: OCSP: Creating DB OCSPCA1DB  - PASSED
chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin/pk12util -d OCSPCA1DB -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss
pk12util: PKCS12 IMPORT SUCCESSFUL
chains.sh: #6835: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database  - PASSED
chains.sh: Create CRL for OCSPCA1DB
crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128001719Z
nextupdate=20131128001719Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Wed Nov 28 00:17:19 2012
    Next Update: Thu Nov 28 00:17:19 2013
    CRL Extensions:
chains.sh: #6836: OCSP: Create CRL for OCSPCA1DB  - PASSED
chains.sh: Revoking certificate with SN 3 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128001720Z
addcert 3 20121128001720Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Wed Nov 28 00:17:20 2012
    Next Update: Thu Nov 28 00:17:19 2013
    Entry 1 (0x1):
        Serial Number: 3 (0x3)
        Revocation Date: Wed Nov 28 00:17:20 2012
    CRL Extensions:
chains.sh: #6837: OCSP: Revoking certificate with SN 3 issued by OCSPCA1  - PASSED
chains.sh: Revoking certificate with SN 4 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128001721Z
addcert 4 20121128001721Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Wed Nov 28 00:17:21 2012
    Next Update: Thu Nov 28 00:17:19 2013
    Entry 1 (0x1):
        Serial Number: 4 (0x4)
        Revocation Date: Wed Nov 28 00:17:21 2012
    Entry 2 (0x2):
        Serial Number: 3 (0x3)
        Revocation Date: Wed Nov 28 00:17:20 2012
    CRL Extensions:
chains.sh: #6838: OCSP: Revoking certificate with SN 4 issued by OCSPCA1  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE11.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE11.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6839: OCSP: Verifying certificate(s)  OCSPEE11.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6840: OCSP: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6841: OCSP: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6842: OCSP: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6843: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6844: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g chain -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g chain -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6845: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g chain -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE31.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA3.cert  -t OCSPRoot
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US"
Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #6846: OCSP: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE31.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA3.cert  -t OCSPRoot
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6847: OCSP: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s doNotUse -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s doNotUse     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6848: OCSP: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s doNotUse -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s forbidFetching -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s forbidFetching     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #6849: OCSP: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s forbidFetching -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s failIfNoInfo     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8071: The OCSP server experienced an internal error.
Returned value is 1, expected result is fail
chains.sh: #6850: OCSP: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s failIfNoInfo     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6851: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE13.cert OCSPCA1.cert with flags  -g leaf -h testLocalInfoFirst -m ocsp -d OCSPCA1DB     -t OCSPCA1
vfychain -d OCSPCA1DB -pp -vv  -g leaf -h testLocalInfoFirst -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE13.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPCA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:46 2012
            Not After : Mon Apr 03 15:38:46 2017
        Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c1:b0:47:12:51:37:68:7d:39:cb:ee:e3:32:2c:ad:b5:
                    44:2c:72:7f:c8:e9:32:79:d9:7d:b9:69:94:bc:5a:9e:
                    5a:3b:0f:e2:07:e5:b2:76:04:73:32:ee:92:8d:a1:2f:
                    ed:e4:e0:5a:92:28:ca:bb:48:fc:5c:44:dc:9a:c0:3b:
                    88:84:0a:bd:6b:4a:c9:18:37:51:e3:a3:3a:e0:40:5c:
                    53:0d:04:ed:c7:18:34:25:5a:5e:00:f5:0d:29:ef:fa:
                    69:e3:6d:96:e3:1e:5b:8a:4e:3e:77:e7:45:16:81:6f:
                    21:01:2c:8d:b1:fa:57:06:f0:9b:95:1a:c3:0d:25:25
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Authority Information Access
            Method: PKIX Online Certificate Status Protocol
            Location: 
                URI: "http://ocsp.kuix.de:2600"

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        88:c4:da:b7:3d:84:1d:1c:ca:f8:c1:2e:46:59:c2:33:
        93:64:38:f9:2a:87:32:ca:ec:e0:ef:ff:cc:1f:9d:96:
        a6:42:b0:cd:8f:b3:85:3a:59:64:34:c1:0d:bb:24:c5:
        36:f6:28:93:a0:3b:58:b8:93:87:c5:6e:f2:64:23:b9:
        c4:a9:53:82:bd:0a:12:92:58:90:01:b1:11:a6:65:aa:
        a9:72:94:60:96:38:fd:e3:9e:14:5b:4e:ed:0d:99:e2:
        94:6a:50:84:88:00:1e:14:a7:ed:20:69:95:9b:cb:b7:
        61:11:b8:14:7a:1e:19:3c:bb:38:5b:97:e0:ad:9f:2e
    Fingerprint (MD5):
        6E:22:37:7A:94:F2:07:60:87:6B:9D:CF:64:C9:D9:37
    Fingerprint (SHA1):
        92:63:FD:E1:AA:A4:45:54:F7:E8:B7:5F:92:8F:74:06:3E:96:BA:47

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User

Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US"
Returned value is 0, expected result is pass
chains.sh: #6852: OCSP: Verifying certificate(s)  OCSPEE13.cert OCSPCA1.cert with flags  -g leaf -h testLocalInfoFirst -m ocsp -d OCSPCA1DB     -t OCSPCA1 - PASSED
chains.sh: Creating DB OCSPRoot1DB
certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd
chains.sh: #6853: OCSP: Creating DB OCSPRoot1DB  - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRoot1DB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #6854: OCSP: Importing certificate OCSPRoot.cert to OCSPRoot1DB database  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot1DB     -t OCSPRoot
vfychain -d OCSPRoot1DB -pp -vv  -g chain -m ocsp -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE23.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6855: OCSP: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot1DB     -t OCSPRoot - PASSED
chains.sh: Creating DB OCSPRoot2DB
certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd
chains.sh: #6856: OCSP: Creating DB OCSPRoot2DB  - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRoot2DB database
certutil -A -n OCSPRoot  -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #6857: OCSP: Importing certificate OCSPRoot.cert to OCSPRoot2DB database  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot2DB     -t OCSPRoot
vfychain -d OCSPRoot2DB -pp -vv  -g chain -m ocsp -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE23.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted Client CA
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #6858: OCSP: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot2DB     -t OCSPRoot - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #6859: CRLDP: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -m 1127191756 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #6860: CRLDP: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #6861: CRLDP: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #6862: CRLDP: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA0Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #6863: CRLDP: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1127191757   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6864: CRLDP: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
chains.sh: #6865: CRLDP: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #6866: CRLDP: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA1Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0-1127191646.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6867: CRLDP: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0Root-1127191633.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #6868: CRLDP: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
chains.sh: #6869: CRLDP: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #6870: CRLDP: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE11Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0-1127191646.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6871: CRLDP: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1127191758   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6872: CRLDP: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
chains.sh: #6873: CRLDP: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #6874: CRLDP: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o CA2Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0-1127191646.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6875: CRLDP: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0Root-1127191634.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #6876: CRLDP: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
chains.sh: #6877: CRLDP: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #6878: CRLDP: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE21Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #6879: CRLDP: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1127191759   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===

===
chains.sh: #6880: CRLDP: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
chains.sh: #6881: CRLDP: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #6882: CRLDP: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE1Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0-1127191646.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6883: CRLDP: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0Root-1127191635.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #6884: CRLDP: Creating certficate EE1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE1CA0.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der
chains.sh: #6885: CRLDP: Importing certificate EE1CA0.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #6886: CRLDP: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/tests_noise -o EE2Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0-1127191646.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #6887: CRLDP: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/pkix/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0Root-1127191636.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #6888: CRLDP: Creating certficate EE2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE2CA0.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der
chains.sh: #6889: CRLDP: Importing certificate EE2CA0.der to EE2DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20121128001730Z
nextupdate=20131128001730Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Wed Nov 28 00:17:30 2012
    Next Update: Thu Nov 28 00:17:30 2013
    CRL Extensions:
chains.sh: #6890: CRLDP: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128001730Z
nextupdate=20131128001730Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 00:17:30 2012
    Next Update: Thu Nov 28 00:17:30 2013
    CRL Extensions:
chains.sh: #6891: CRLDP: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128001730Z
nextupdate=20131128001730Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 00:17:30 2012
    Next Update: Thu Nov 28 00:17:30 2013
    CRL Extensions:
chains.sh: #6892: CRLDP: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20121128001730Z
nextupdate=20131128001730Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Wed Nov 28 00:17:30 2012
    Next Update: Thu Nov 28 00:17:30 2013
    CRL Extensions:
chains.sh: #6893: CRLDP: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 20 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128001731Z
addcert 20 20121128001731Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 00:17:31 2012
    Next Update: Thu Nov 28 00:17:30 2013
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Wed Nov 28 00:17:31 2012
    CRL Extensions:
chains.sh: #6894: CRLDP: Revoking certificate with SN 20 issued by CA0  - PASSED
chains.sh: Revoking certificate with SN 40 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128001732Z
addcert 40 20121128001732Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 00:17:32 2012
    Next Update: Thu Nov 28 00:17:30 2013
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Wed Nov 28 00:17:31 2012
    Entry 2 (0x2):
        Serial Number: 40 (0x28)
        Revocation Date: Wed Nov 28 00:17:32 2012
    CRL Extensions:
chains.sh: #6895: CRLDP: Revoking certificate with SN 40 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #6896: CRLDP: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #6897: CRLDP: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #6898: CRLDP: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g chain -h requireFreshInfo -m crl -f    EE11CA1.der CA1CA0.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191756 (0x432f94cc)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:17:28 2012
            Not After : Tue Nov 28 00:17:28 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ad:bd:60:a3:fa:b3:5d:6f:e3:64:7f:fd:26:8e:d1:30:
                    4e:c8:fc:f3:7d:9e:94:3d:24:e8:22:ec:db:4f:2f:ce:
                    18:a6:29:6b:47:02:47:2c:f8:78:59:fd:b0:6b:2d:4d:
                    56:d5:3b:bc:03:1a:13:8f:c7:6f:87:79:91:b1:c5:55:
                    d0:ef:fa:51:79:a9:5e:ae:a8:87:a7:20:62:4b:c0:42:
                    6f:62:ca:c1:33:5c:f1:e2:76:c2:01:a2:88:b0:5c:97:
                    3f:39:9b:d9:4e:a8:21:e8:af:d8:fa:b6:65:83:4b:80:
                    d5:8d:ba:5f:75:a9:4f:0b:e9:a1:11:ed:9c:a6:07:e5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        2e:aa:5f:23:27:bc:9d:a1:c3:3b:d1:8a:3c:85:91:86:
        9e:66:49:a9:5f:a8:1f:37:e0:ae:fd:9c:ce:1d:bd:0a:
        ff:9e:da:bd:fa:4c:d0:2f:bc:cc:ea:57:a5:fd:4a:48:
        03:19:3f:43:3d:25:4a:d5:47:69:e7:cb:b3:63:87:fa:
        b1:fe:1c:7e:e5:b2:76:e6:a2:73:8a:4b:b9:71:78:27:
        3c:04:38:b2:01:ce:75:25:6f:fd:ca:a7:34:fb:80:19:
        6e:76:67:c2:a8:ff:7f:cf:85:9c:cc:12:50:25:4f:86:
        17:b0:b7:a7:0e:21:a8:50:f5:ea:d4:3f:f2:d8:e8:2a
    Fingerprint (MD5):
        AD:A2:F2:9A:B3:E5:C1:83:06:6B:84:9B:C1:66:9D:E5
    Fingerprint (SHA1):
        56:58:2C:43:57:23:3A:58:96:23:29:9F:44:B5:38:24:D5:56:C2:36

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #6899: CRLDP: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g chain -h requireFreshInfo -m crl -f    EE21CA2.der CA2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6900: CRLDP: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -h requireFreshInfo -m crl -f    EE1CA0.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127191756 (0x432f94cc)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:17:28 2012
            Not After : Tue Nov 28 00:17:28 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ad:bd:60:a3:fa:b3:5d:6f:e3:64:7f:fd:26:8e:d1:30:
                    4e:c8:fc:f3:7d:9e:94:3d:24:e8:22:ec:db:4f:2f:ce:
                    18:a6:29:6b:47:02:47:2c:f8:78:59:fd:b0:6b:2d:4d:
                    56:d5:3b:bc:03:1a:13:8f:c7:6f:87:79:91:b1:c5:55:
                    d0:ef:fa:51:79:a9:5e:ae:a8:87:a7:20:62:4b:c0:42:
                    6f:62:ca:c1:33:5c:f1:e2:76:c2:01:a2:88:b0:5c:97:
                    3f:39:9b:d9:4e:a8:21:e8:af:d8:fa:b6:65:83:4b:80:
                    d5:8d:ba:5f:75:a9:4f:0b:e9:a1:11:ed:9c:a6:07:e5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        2e:aa:5f:23:27:bc:9d:a1:c3:3b:d1:8a:3c:85:91:86:
        9e:66:49:a9:5f:a8:1f:37:e0:ae:fd:9c:ce:1d:bd:0a:
        ff:9e:da:bd:fa:4c:d0:2f:bc:cc:ea:57:a5:fd:4a:48:
        03:19:3f:43:3d:25:4a:d5:47:69:e7:cb:b3:63:87:fa:
        b1:fe:1c:7e:e5:b2:76:e6:a2:73:8a:4b:b9:71:78:27:
        3c:04:38:b2:01:ce:75:25:6f:fd:ca:a7:34:fb:80:19:
        6e:76:67:c2:a8:ff:7f:cf:85:9c:cc:12:50:25:4f:86:
        17:b0:b7:a7:0e:21:a8:50:f5:ea:d4:3f:f2:d8:e8:2a
    Fingerprint (MD5):
        AD:A2:F2:9A:B3:E5:C1:83:06:6B:84:9B:C1:66:9D:E5
    Fingerprint (SHA1):
        56:58:2C:43:57:23:3A:58:96:23:29:9F:44:B5:38:24:D5:56:C2:36

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #6901: CRLDP: Verifying certificate(s)  EE1CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -h requireFreshInfo -m crl -f    EE2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #6902: CRLDP: Verifying certificate(s)  EE2CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
trying to kill httpserv with PID 7053 at Tue Nov 27 19:17:33 EST 2012
kill -USR1 7053
selfserv: normal termination
httpserv -b -p 8553 2>/dev/null;
httpserv with PID 7053 killed at Tue Nov 27 19:17:33 EST 2012
TIMESTAMP chains END: Tue Nov 27 19:17:33 EST 2012
chains.sh: Testing with upgraded library ===============================
cp: cannot stat `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/cert.done': No such file or directory
Running tests for dbupgrade
TIMESTAMP dbupgrade BEGIN: Tue Nov 27 19:17:33 EST 2012
dbupgrade.sh: DB upgrade tests ===============================
Reset databases to their initial values:
certutil: could not find certificate named "objsigner": security library: bad database.

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
dbupgrade.sh: Legacy to shared Library update ===============================
alicedir
upgrading db alicedir


Generating key.  This may take a few moments...

dbupgrade.sh: #6903: Upgrading alicedir  - PASSED
bobdir
upgrading db bobdir


Generating key.  This may take a few moments...

dbupgrade.sh: #6904: Upgrading bobdir  - PASSED
CA
upgrading db CA


Generating key.  This may take a few moments...

dbupgrade.sh: #6905: Upgrading CA  - PASSED
cert_extensions
upgrading db cert_extensions


Generating key.  This may take a few moments...

dbupgrade.sh: #6906: Upgrading cert_extensions  - PASSED
client
upgrading db client


Generating key.  This may take a few moments...

dbupgrade.sh: #6907: Upgrading client  - PASSED
clientCA
upgrading db clientCA


Generating key.  This may take a few moments...

dbupgrade.sh: #6908: Upgrading clientCA  - PASSED
dave
upgrading db dave


Generating key.  This may take a few moments...

dbupgrade.sh: #6909: Upgrading dave  - PASSED
eccurves
upgrading db eccurves


Generating key.  This may take a few moments...

dbupgrade.sh: #6910: Upgrading eccurves  - PASSED
eve
upgrading db eve


Generating key.  This may take a few moments...

dbupgrade.sh: #6911: Upgrading eve  - PASSED
ext_client
upgrading db ext_client


Generating key.  This may take a few moments...

dbupgrade.sh: #6912: Upgrading ext_client  - PASSED
ext_server
upgrading db ext_server


Generating key.  This may take a few moments...

dbupgrade.sh: #6913: Upgrading ext_server  - PASSED
SDR
upgrading db SDR


Generating key.  This may take a few moments...

dbupgrade.sh: #6914: Upgrading SDR  - PASSED
server
upgrading db server


Generating key.  This may take a few moments...

dbupgrade.sh: #6915: Upgrading server  - PASSED
serverCA
upgrading db serverCA


Generating key.  This may take a few moments...

dbupgrade.sh: #6916: Upgrading serverCA  - PASSED
tools/copydir
skipping db tools/copydir
dbupgrade.sh: #6917: No directory tools/copydir  - PASSED
upgrading db fips


Generating key.  This may take a few moments...

dbupgrade.sh: #6918: Upgrading fips  - PASSED

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
TIMESTAMP dbupgrade END: Tue Nov 27 19:18:41 EST 2012
Running tests for lowhash
TIMESTAMP lowhash BEGIN: Tue Nov 27 19:18:41 EST 2012
lowhash.sh: Lowhash Tests ===============================
lowhashtest with fips mode=
lowhashtest MD5
lowhash.sh: #6919: lowhashtest with fips mode= for MD5  - PASSED
lowhashtest SHA1
lowhash.sh: #6920: lowhashtest with fips mode= for SHA1  - PASSED
lowhashtest SHA224
lowhash.sh: #6921: lowhashtest with fips mode= for SHA224  - PASSED
lowhashtest SHA256
lowhash.sh: #6922: lowhashtest with fips mode= for SHA256  - PASSED
lowhashtest SHA384
lowhash.sh: #6923: lowhashtest with fips mode= for SHA384  - PASSED
lowhashtest SHA512
lowhash.sh: #6924: lowhashtest with fips mode= for SHA512  - PASSED
lowhashtest with fips mode=
lowhashtest MD5
lowhash.sh: #6925: lowhashtest with fips mode= for MD5  - PASSED
lowhashtest SHA1
lowhash.sh: #6926: lowhashtest with fips mode= for SHA1  - PASSED
lowhashtest SHA224
lowhash.sh: #6927: lowhashtest with fips mode= for SHA224  - PASSED
lowhashtest SHA256
lowhash.sh: #6928: lowhashtest with fips mode= for SHA256  - PASSED
lowhashtest SHA384
lowhash.sh: #6929: lowhashtest with fips mode= for SHA384  - PASSED
lowhashtest SHA512
lowhash.sh: #6930: lowhashtest with fips mode= for SHA512  - PASSED
lowhash.sh done
TIMESTAMP lowhash END: Tue Nov 27 19:18:42 EST 2012
Running tests for tools
TIMESTAMP tools BEGIN: Tue Nov 27 19:18:42 EST 2012
tools.sh: Tools Tests with ECC ===============================
tools.sh: Exporting Alice's email cert & key - default ciphers
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6931: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                24:37:40:28:c2:dd:ed:87:ce:86:b7:c3:3d:78:7a:ff
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #6932: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6933: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's email EC cert & key---------------
pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \
         -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6934: Exporting Alice's email EC cert & key (pk12util -o)  - PASSED
tools.sh: Importing Alice's email EC cert & key --------------
pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6935: Importing Alice's email EC cert & key (pk12util -i)  - PASSED
tools.sh: Listing Alice's pk12 EC file -----------------
pk12util -l Alice-ec.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice-ec

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                3c:e8:60:4b:22:75:fe:3b:98:d6:fb:43:0c:37:45:84
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Tue Nov 27 23:55:16 2012
            Not After : Mon Nov 27 23:55:16 2062
        Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor
            nia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:23
            EC Public Key:
                PublicValue:
                    04:00:f1:79:3b:f2:d4:94:70:40:9f:e0:c4:59:f6:16:
                    8e:f8:c1:df:08:80:9d:af:6c:6b:f3:8e:72:f6:87:10:
                    a4:7a:f3:e5:47:17:a4:c4:ac:98:8f:51:49:ea:77:05:
                    59:df:1e:b6:d8:d4:00:d7:1a:64:c0:13:11:57:3e:68:
                    73:24:f6:00:01:8c:f4:52:40:8a:21:1d:f5:7d:5b:45:
                    26:da:36:39:bb:0f:e2:b0:7c:cc:b9:30:91:eb:66:f2:
                    58:fe:67:f6:62:85:b4:a1:9f:65:c3:60:ae:66:40:89:
                    32:2d:00:92:f9:35:72:d6:1b:18:98:e7:a6:e1:db:91:
                    75:1f:de:e8:cb
                Curve: SECG elliptic curve secp521r1 (aka NIST P-521)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:88:02:42:01:ae:63:26:63:67:60:3a:06:f3:1c:
        1a:ff:18:3f:a7:91:cc:96:37:b0:ce:78:c5:64:cf:90:
        f5:9f:2c:42:ad:83:a7:cb:42:68:95:1e:dc:b9:68:35:
        aa:7d:0d:b5:4e:8d:96:8e:ca:d9:e2:0a:d9:a9:63:9b:
        ea:23:9b:75:e1:4f:1f:02:42:01:e7:55:92:d1:b4:06:
        60:97:28:0f:87:af:9e:46:b9:a0:bb:54:91:5c:73:4c:
        0f:f9:bf:fb:72:ba:f5:c7:00:33:9a:87:7b:60:ac:c9:
        86:0f:45:34:9f:3e:9f:e6:4a:a9:e0:89:b2:51:de:d6:
        5c:54:ef:64:91:ff:02:4d:0f:87:80
    Fingerprint (MD5):
        9B:36:FA:C2:0E:1F:26:76:CD:34:8F:F3:3C:47:4C:97
    Fingerprint (SHA1):
        E8:77:A2:4F:CA:86:26:80:B3:14:5E:AF:A4:A0:35:BB:5D:16:27:82

    Friendly Name: TestCA-ec

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Tue Nov 27 23:55:23 2012
            Not After : Mon Nov 27 23:55:23 2017
        Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S
            T=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:22
            EC Public Key:
                PublicValue:
                    04:d9:55:dc:f4:97:1c:63:c6:b2:97:bd:68:71:e5:15:
                    fb:59:88:71:68:18:4b:b9:cf:41:1c:89:d8:88:9d:1e:
                    c6:45:a5:8d:ec:84:cb:e6:ac:40:e6:00:24:09:0b:c1:
                    2a:e5:cb:d4:e9:0a:1c:0c:c0:c4:0b:3d:ad:ce:5a:e2:
                    24:d2:bc:f3:90:90:8e:f4:a7:b5:32:58:21:4f:ce:00:
                    f3:7e:60:58:5b:6a:7f:5a:ce:13:4d:da:89:aa:b0:47:
                    9f
                Curve: SECG elliptic curve secp384r1 (aka NIST P-384)
    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:88:02:42:01:24:87:61:4d:3a:be:2d:5e:e6:f7:
        ec:5a:16:63:61:10:df:f4:93:86:cb:7f:49:2b:bf:62:
        45:85:d0:52:26:ef:14:73:c4:a7:ec:e5:82:20:92:bf:
        9d:17:20:05:c8:92:f7:39:f6:4b:07:6e:20:89:f3:db:
        ae:31:a4:d4:ef:ea:c4:02:42:01:ad:12:ff:38:fb:e6:
        06:42:cb:b0:e9:bd:a7:73:c6:e5:7b:72:4d:20:54:a5:
        e4:35:fb:98:ab:e3:82:2f:f3:58:93:26:22:a9:59:21:
        49:c1:08:8e:f1:b2:7d:00:22:98:70:29:2d:3f:1a:06:
        12:7e:59:a2:a3:6c:62:ae:95:68:8b
    Fingerprint (MD5):
        8F:FF:40:B3:FD:46:09:F3:11:D6:88:CF:35:7F:6C:C9
    Fingerprint (SHA1):
        C7:57:97:77:7F:32:F7:88:8C:5C:4B:85:C4:76:D4:E4:F1:C3:74:33

    Friendly Name: Alice-ec

tools.sh: #6936: Listing Alice's pk12 EC file (pk12util -l)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6937: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                3a:91:91:31:93:34:e5:24:70:77:cd:68:ca:4b:ba:ce
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #6938: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6939: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6940: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                95:62:af:e9:ad:a0:5c:ab:dc:56:00:96:e9:c9:e6:49
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #6941: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6942: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6943: Exporting with [RC2-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                a4:d2:5f:d7:35:a1:e1:48:47:a0:8b:65:79:8b:66:be
            Iteration Count: 2000 (0x7d0)
tools.sh: #6944: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6945: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6946: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                e5:e9:fa:71:5d:e2:4d:e1:ae:ad:46:88:7f:89:d6:2b
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #6947: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6948: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6949: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                6a:27:aa:c4:b6:63:b9:fe:65:70:1c:ab:39:f1:dd:dc
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #6950: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6951: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6952: Exporting with [DES-EDE3-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                f7:63:40:85:3e:d4:c4:90:b7:6e:69:b8:77:a6:7f:38
            Iteration Count: 2000 (0x7d0)
tools.sh: #6953: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6954: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6955: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        ff:0a:cb:a3:e3:d6:cb:c7:79:0f:e9:22:08:08:8f:97
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:a8:cf:4f:2e:36:9a:5f:b3:3f:f1:d9:e0:df:4b:
                    19:b2
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #6956: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6957: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6958: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        67:34:22:bd:cd:be:94:f7:fb:1c:30:9c:45:f8:bf:d1
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:f6:2e:bc:a0:0b:3e:81:36:30:5d:47:ae:46:18:
                    e8:59
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #6959: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6960: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6961: Exporting with [AES-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        4e:f8:c5:09:32:00:ef:12:85:9c:6a:51:ea:71:43:f3
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:23:54:73:3f:e6:90:db:0d:4a:58:5b:39:b3:cb:
                    d7:30
tools.sh: #6962: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6963: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6964: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        40:b4:c4:0f:97:0c:d9:63:14:ef:dd:18:3a:7c:25:6b
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:15:93:f2:74:68:2c:14:02:e4:81:52:71:87:07:
                    f4:e8
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #6965: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6966: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6967: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        a6:e2:dc:bc:d5:37:06:d5:96:2e:a8:df:17:ef:47:d2
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:cc:02:ad:f0:ba:d0:b0:12:cc:02:3d:99:94:2f:
                    98:47
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #6968: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6969: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6970: Exporting with [AES-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        c5:df:e6:58:2b:9a:a0:3e:a4:be:20:68:b3:d0:85:dc
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:a5:15:18:98:7e:4d:9a:b9:50:6f:dd:50:f5:55:
                    a5:c5
tools.sh: #6971: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6972: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6973: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        bd:12:ed:65:5a:6b:8f:e5:6d:b2:a1:b1:46:3c:9a:37
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:41:39:d6:47:8c:58:a4:b8:b3:e5:ac:d3:04:a5:
                    aa:47
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #6974: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6975: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6976: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        6e:72:6e:80:5a:24:26:07:b5:2f:a9:5b:d7:69:ef:52
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:5f:61:9c:a3:49:ba:0b:94:7a:70:46:4c:60:0c:
                    fb:e6
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #6977: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6978: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6979: Exporting with [AES-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        d9:38:03:72:d4:0d:0d:32:72:44:60:64:42:0f:9f:47
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:0a:82:23:54:ae:e2:5e:e2:0f:16:4d:c7:50:5a:
                    db:23
tools.sh: #6980: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6981: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6982: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        43:03:02:67:8a:c6:b4:44:fc:b6:ad:0c:2b:52:40:2f
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:c8:21:81:e6:2d:76:1d:51:b1:b3:c6:a1:75:0c:
                    47:75
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #6983: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6984: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6985: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        e2:70:ad:e9:6a:c7:d4:bc:10:4a:a7:79:b6:65:f6:3a
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:6f:5e:df:e4:70:79:96:f0:60:83:26:7b:4f:09:
                    ee:ca
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #6986: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6987: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6988: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        ae:ac:10:d2:c0:3a:50:c2:7c:d4:64:45:16:22:bb:a3
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:1e:f8:36:e6:ba:5b:b2:1d:7a:79:75:91:a6:3f:
                    61:ef
tools.sh: #6989: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6990: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6991: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        e5:3b:34:74:97:25:24:7b:4a:10:da:e7:fb:a4:ea:62
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:f2:b1:91:17:e4:fb:b8:41:65:0e:98:2f:d1:92:
                    fe:5f
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #6992: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6993: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6994: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        b0:31:20:08:8c:82:6d:4f:7e:b3:eb:56:38:fd:ef:16
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:3f:ab:cf:72:6b:38:ab:00:cc:3f:ef:dd:f5:e9:
                    b4:79
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #6995: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6996: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #6997: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        25:44:1b:53:ee:9d:3e:c9:6b:58:d2:6a:5e:80:82:60
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:90:6f:9b:de:6b:bb:6d:dd:f3:1d:b2:28:41:40:
                    71:b3
tools.sh: #6998: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #6999: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7000: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        d3:be:86:3d:05:8d:90:48:1f:8c:dc:72:39:af:92:34
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:c0:ae:14:d0:b0:c0:58:f4:67:ed:c4:a0:8b:da:
                    9d:6d
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7001: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7002: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7003: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        bf:73:3a:80:33:65:67:2e:53:d5:ec:b6:db:08:87:ca
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:a2:3e:29:a5:81:c0:96:56:20:c5:22:10:3a:88:
                    09:24
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7004: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7005: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7006: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        20:5c:3b:5d:27:1b:a9:97:d0:ed:92:c9:0a:c2:47:d7
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:12:2c:f9:ae:15:2b:b8:0d:58:f8:fc:f9:ee:2e:
                    92:44
tools.sh: #7007: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7008: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7009: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                84:12:1d:b0:5d:91:49:89:21:50:b3:50:69:95:db:16
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7010: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7011: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7012: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                cb:65:2f:14:04:8a:f0:de:fb:5a:83:e9:f7:41:ca:50
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7013: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7014: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7015: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                3b:c1:dd:89:11:71:3b:a5:a9:23:4a:68:fc:6e:ff:4d
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7016: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7017: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7018: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                d3:28:c3:6f:b6:7b:af:b9:d4:5e:31:6a:09:89:11:04
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7019: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7020: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7021: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                d4:e0:3a:17:95:18:ad:61:1f:18:44:df:64:06:ca:bd
            Iteration Count: 2000 (0x7d0)
tools.sh: #7022: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7023: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7024: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                64:e6:d9:69:6e:22:d7:0e:62:bf:3a:a1:6b:b4:42:1e
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7025: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7026: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7027: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                90:0c:09:23:b9:19:1f:be:90:44:e8:42:d9:6e:fc:bd
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7028: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7029: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7030: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                e1:0b:8b:0e:be:23:9c:78:19:3e:7d:44:3a:b3:26:f5
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7031: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7032: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7033: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                59:24:97:80:7b:34:5b:de:ee:a4:3d:c0:63:2d:75:cf
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7034: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7035: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7036: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                b7:56:de:78:9b:6d:2b:5d:0a:a6:a0:3b:69:7c:72:9c
            Iteration Count: 2000 (0x7d0)
tools.sh: #7037: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7038: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7039: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                f0:46:87:f8:7f:af:60:2d:bc:fb:4a:44:e9:4d:bc:55
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7040: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7041: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7042: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                82:90:72:e9:39:8e:98:2f:16:2f:35:de:da:77:05:53
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7043: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7044: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7045: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                ae:f0:c2:e9:b6:75:64:e5:4e:9f:d7:e3:fc:85:49:1b
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7046: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7047: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7048: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                c5:d0:34:23:a6:8f:f1:8f:a2:72:2e:da:0a:2d:45:27
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7049: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7050: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7051: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                41:80:de:4d:e4:11:39:6f:43:ab:cf:92:28:59:2b:5f
            Iteration Count: 2000 (0x7d0)
tools.sh: #7052: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7053: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7054: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                cb:3d:4f:a9:de:29:aa:e1:73:56:5c:ea:0e:89:38:10
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7055: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7056: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7057: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                f5:da:1f:4a:44:79:65:7d:2c:0c:48:f1:31:74:78:a7
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7058: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7059: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7060: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                8b:09:14:aa:2e:6b:5b:e9:f2:62:fd:5a:d5:99:c9:44
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7061: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7062: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7063: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                1f:6e:6c:05:48:22:8a:b2:46:54:25:a5:21:7d:26:35
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7064: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7065: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:null]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7066: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                5a:1d:24:b6:c5:a7:28:60:cd:49:ce:96:81:07:1b:44
            Iteration Count: 2000 (0x7d0)
tools.sh: #7067: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7068: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7069: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                37:88:b4:f3:36:c3:80:14:cf:09:df:4f:13:4c:d8:8a
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7070: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7071: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7072: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                20:9c:1c:02:fd:ec:81:41:8d:9b:e3:f5:8d:f4:18:70
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7073: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7074: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7075: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                a3:c7:44:4e:99:0a:db:1e:58:d6:47:9d:86:78:9f:dc
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7076: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7077: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7078: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                d2:4e:8a:94:1d:17:75:26:c9:5c:7f:2b:0f:82:5b:58
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7079: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7080: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7081: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                ed:a7:06:5e:be:08:2d:59:64:bd:3a:ed:94:13:fb:21
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7082: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7083: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7084: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                a1:53:4e:40:80:99:1d:85:91:b4:64:07:f5:aa:09:93
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7085: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7086: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7087: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                97:89:12:07:14:96:6a:b3:2a:42:74:80:c9:67:16:73
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7088: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7089: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7090: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                8c:74:a7:c7:bd:11:96:30:36:cf:46:f0:82:f5:2a:97
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7091: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7092: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7093: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                29:cc:00:87:22:f1:06:b2:86:be:b8:4d:a9:76:25:40
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7094: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7095: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7096: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                1b:59:ce:6d:22:84:7d:8a:57:a6:48:b3:54:3e:6b:c9
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:15 2012
            Not After : Mon Nov 27 23:55:15 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    99:20:78:98:30:bb:e5:bb:73:08:6c:6c:2c:df:1f:68:
                    0c:89:53:7d:89:62:70:65:18:73:c8:27:7b:06:68:ff:
                    df:b0:8c:cc:92:bb:1f:81:c2:a4:61:ea:27:71:1f:ad:
                    a9:4a:79:27:33:40:bd:39:95:e1:33:0a:b5:0c:e0:9b:
                    d0:a5:3f:33:c7:a9:eb:af:b8:6e:a9:68:1f:b9:b7:c9:
                    09:ad:f3:32:f6:26:46:f8:88:d9:4c:90:80:dd:e9:79:
                    fb:1e:8b:7e:c3:28:81:eb:79:bd:fc:b8:43:78:d6:f5:
                    66:30:24:ff:3c:50:3f:b7:c7:36:ed:e8:02:27:15:7b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        64:ce:55:d8:5b:38:d1:11:2a:87:ed:b9:f2:a1:02:c4:
        ed:7f:d6:83:dc:d9:68:b7:ea:57:f2:70:54:d0:7a:48:
        5a:2d:77:0e:ff:5c:a1:6c:9b:ee:2d:9f:e7:1d:a7:49:
        41:67:47:bb:e2:ad:48:20:de:08:70:62:fa:bc:13:c5:
        77:da:ee:33:57:43:ea:a0:9c:a7:36:49:84:ac:8d:44:
        c0:0f:47:83:45:d6:0c:cd:74:a1:4e:92:bb:2e:b9:e9:
        51:8e:5f:f3:8f:f7:06:cc:2d:99:eb:81:19:95:b3:1f:
        ec:5b:4d:45:c3:5b:d8:2a:9e:55:6e:f9:53:8d:c1:7f
    Fingerprint (MD5):
        0D:85:8D:C7:39:45:9B:53:98:3B:99:9A:93:1D:00:05
    Fingerprint (SHA1):
        68:CD:F4:AA:5E:05:1B:D5:4F:C9:77:85:9F:01:C3:B2:E4:1A:82:4B

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:22 2012
            Not After : Mon Nov 27 23:55:22 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:d3:5d:3f:ee:8e:1a:55:82:8c:92:87:b2:9a:7f:db:
                    4f:61:18:9b:99:79:8a:25:8b:2b:23:7d:ec:fc:c4:e5:
                    6d:75:1a:a6:73:56:e2:00:16:a1:2b:08:25:be:4a:a9:
                    bd:27:53:b4:1e:7c:39:8a:e6:2e:1e:49:17:0d:20:0c:
                    91:1f:bf:ee:03:79:99:52:84:73:3a:0f:77:fc:23:b5:
                    de:c5:5d:b7:c9:68:2d:10:a3:e0:9a:87:ce:5b:bf:f6:
                    a5:31:65:d2:bc:40:f7:5d:85:df:40:d4:40:40:6a:5d:
                    41:ad:22:86:56:f8:8b:10:81:75:6c:38:8f:2b:de:99
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:87:27:a0:f4:f7:a9:75:e2:9e:7b:b8:56:d1:2c:51:
        01:08:31:1a:a4:a2:0d:96:87:89:23:00:a6:2e:af:30:
        7b:86:11:37:8c:bb:cf:df:db:d2:18:96:fd:2d:57:47:
        a9:32:2d:7c:e8:73:7c:bc:40:2b:e9:7d:2f:b4:a7:a2:
        0c:18:20:b7:00:a6:50:7f:8a:40:73:e2:2d:fe:c1:b7:
        01:51:5f:c5:a8:33:27:4e:12:d9:4b:9e:ae:eb:05:c6:
        a0:90:d8:2c:2d:49:f0:2a:54:0c:bc:81:ef:0c:0b:a4:
        20:0c:86:c4:7b:7a:df:4b:13:14:0b:8a:12:29:0e:60
    Fingerprint (MD5):
        12:E7:06:96:6B:67:67:E7:36:D3:47:41:37:9D:F8:F3
    Fingerprint (SHA1):
        62:38:92:98:3E:7B:6E:78:8F:73:FC:48:3C:A5:45:FD:E3:08:5B:3F

    Friendly Name: Alice

tools.sh: #7097: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #7098: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c null
pk12util: Algorithm: "null": security library: invalid algorithm.
tools.sh: #7099: Exporting with [null:default] (pk12util -o)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #7100: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Create objsign cert -------------------------------
signtool -G "objectsigner" -d ../tools/signdir -p "nss"

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit the browser before continuing this operation. Enter 
"y" to continue, or anything else to abort: 

Enter certificate information.  All fields are optional. Acceptable
characters are numbers, letters, spaces, and apostrophes.
certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair
certificate request generated
certificate has been signed
certificate "objsigner" added to database
Exported certificate to x509.raw and x509.cacert.
tools.sh: #7101: Create objsign cert (signtool -G)  - PASSED
tools.sh: Signing a jar of files ----------------------------
signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> signjs.html
adding ../tools/html/signjs.html to nojs.jar...(deflated 28%)
--> sign.html
adding ../tools/html/sign.html to nojs.jar...(deflated 26%)
Generating zigbert.sf file..
adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%)
adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%)
tree "../tools/html" signed successfully
tools.sh: #7102: Signing a jar of files (signtool -Z)  - PASSED
tools.sh: Listing signed files in jar ----------------------
signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner
archive "nojs.jar" has passed crypto verification.
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match
found a RSA signature file: META-INF/zigbert.rsa

          status   path
    ------------   -------------------
        verified   signjs.html
        verified   sign.html
tools.sh: #7103: Listing signed files in jar (signtool -v)  - PASSED
tools.sh: Show who signed jar ------------------------------
signtool -w nojs.jar -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #7104: Show who signed jar (signtool -w)  - PASSED
tools.sh: Signing a xpi of files ----------------------------
signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> signjs.html
--> sign.html
Generating zigbert.sf file..
Creating XPI Compatible Archive 
adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%)
--> sign.html
adding ../tools/html/sign.html to nojs.xpi...(deflated 26%)
adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%)
tree "../tools/html" signed successfully
tools.sh: #7105: Signing a xpi of files (signtool -Z -X)  - PASSED
tools.sh: Listing signed files in xpi ----------------------
signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner
archive "nojs.xpi" has passed crypto verification.
found a RSA signature file: META-INF/zigbert.rsa
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match

          status   path
    ------------   -------------------
        verified   signjs.html
        verified   sign.html
tools.sh: #7106: Listing signed files in xpi (signtool -v)  - PASSED
tools.sh: Show who signed xpi ------------------------------
signtool -w nojs.xpi -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #7107: Show who signed xpi (signtool -w)  - PASSED
TIMESTAMP tools END: Tue Nov 27 19:19:40 EST 2012
Running tests for fips
TIMESTAMP fips BEGIN: Tue Nov 27 19:19:40 EST 2012
fips.sh: FIPS 140 Compliance Tests ===============================
fips.sh: Verify this module is in FIPS mode  -----------------
modutil -dbdir ../fips -list

Listing of PKCS #11 Modules
-----------------------------------------------------------
  1. NSS Internal FIPS PKCS #11 Module
 slots: 1 slot attached
status: loaded

 slot: NSS FIPS 140-2 User Private Key Services
token: NSS FIPS 140-2 Certificate DB

  2. RootCerts
library name: /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so
 slots: 1 slot attached
status: loaded

 slot: NSS Builtin Objects
token: Builtin Object Token
-----------------------------------------------------------
FIPS mode enabled.
fips.sh: #7108: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #7109: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys -------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      162e1342f74457c0df3b425bb3cbaf86529eeeee   FIPS_PUB_140_Test_Certificate
fips.sh: #7110: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Attempt to list FIPS module keys with incorrect password
certutil -d ../fips -K -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/tests.fipsbadpw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
Incorrect password/PIN entered.
certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect.
fips.sh: #7111: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED
certutil -K returned 255
fips.sh: Validate the certificate --------------------------
certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw
certutil: certificate is valid
fips.sh: #7112: Validate the certificate (certutil -V -e) . - PASSED
fips.sh: Export the certificate and key as a PKCS#12 file --
pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 EXPORT SUCCESSFUL
fips.sh: #7113: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED
fips.sh: Export the certificate as a DER-encoded file ------
certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt
fips.sh: #7114: Export the certificate as a DER (certutil -L -r) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #7115: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Delete the certificate and key from the FIPS module
certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw
fips.sh: #7116: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #7117: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys.
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
certutil: no keys found
fips.sh: #7118: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #7119: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #7120: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      162e1342f74457c0df3b425bb3cbaf86529eeeee   FIPS_PUB_140_Test_Certificate
fips.sh: #7121: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Delete the certificate from the FIPS module
certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate
fips.sh: #7122: Delete the certificate from the FIPS module (certutil -D) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #7123: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #7124: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #7125: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      162e1342f74457c0df3b425bb3cbaf86529eeeee   FIPS_PUB_140_Test_Certificate
fips.sh: #7126: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Run PK11MODE in FIPSMODE  -----------------
pk11mode -d ../fips -p fips- -f ../tests.fipspw
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
**** Total number of TESTS ran in FIPS MODE is 106. ****
**** ALL TESTS PASSED ****
fips.sh: #7127: Run PK11MODE in FIPS mode (pk11mode) . - PASSED
fips.sh: Run PK11MODE in Non FIPSMODE  -----------------
pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
**** Total number of TESTS ran in NON FIPS MODE is 104. ****
**** ALL TESTS PASSED ****
fips.sh: #7128: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED
mkdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
mkdir: cannot create directory `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle': File exists
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcertdb.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcrmf.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcryptohi.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libdbm.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libjar.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnspr4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnspr4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssb.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckfw.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdbm3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdbm3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdbm.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdev.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsssysinit.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsssysinit.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssutil3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssutil.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs12.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs7.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcertsel.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixchecker.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcrlsel.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixmodule.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixparams.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixpki.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixresults.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixstore.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixsystem.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixutil.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libplc4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libplc4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libplds4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libplds4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsmime3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsmime.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsqlite3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsqlite.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle
fips.sh: Detect mangled softoken--------------------------
mangling /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle/libsoftokn3.so
mangle -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle/libsoftokn3.so -o -8 -b 5
Changing byte 0x000b28a4 (731300): from 5f (95) to 7f (127)
LD_LIBRARY_PATH=/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/fips/mangle dbtest -r -d ../fips
fips.sh: #7129: Init NSS with a corrupted library (dbtest -r) . - PASSED
fips.sh done
TIMESTAMP fips END: Tue Nov 27 19:20:04 EST 2012
Running tests for crmf
TIMESTAMP crmf BEGIN: Tue Nov 27 19:20:04 EST 2012
crmf.sh: CRMF/CMMF Tests ===============================
crmf.sh: CRMF/CMMF Tests ------------------------------
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode

crmftest v1.0
Generating CRMF request
Decoding CRMF request
crmftest: Processing cert request 0
crmftest: Processing cert request 1
Exiting successfully!!!

crmf.sh: #7130: CRMF test . - PASSED
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf

crmftest v1.0
Doing CMMF Stuff
Exiting successfully!!!

crmf.sh: #7131: CMMF test . - PASSED
TIMESTAMP crmf END: Tue Nov 27 19:20:05 EST 2012
Running tests for smime
TIMESTAMP smime BEGIN: Tue Nov 27 19:20:05 EST 2012
smime.sh: S/MIME Tests with ECC ===============================
smime.sh: Signing Detached Message {SHA1} ------------------
cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1
smime.sh: #7132: Create Detached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #7133: Verifying Alice's Detached Signature (SHA1) . - PASSED
smime.sh: Signing Attached Message (SHA1) ------------------
cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1
smime.sh: #7134: Create Attached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1
smime.sh: #7135: Decode Alice's Attached Signature (SHA1) . - PASSED
diff alice.txt alice.data.SHA1
smime.sh: #7136: Compare Attached Signed Data and Original (SHA1) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------
cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1
smime.sh: #7137: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #7138: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------
cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1
smime.sh: #7139: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1
smime.sh: #7140: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED
diff alice.txt alice-ec.data.SHA1
smime.sh: #7141: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Detached Message {SHA256} ------------------
cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256
smime.sh: #7142: Create Detached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #7143: Verifying Alice's Detached Signature (SHA256) . - PASSED
smime.sh: Signing Attached Message (SHA256) ------------------
cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256
smime.sh: #7144: Create Attached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256
smime.sh: #7145: Decode Alice's Attached Signature (SHA256) . - PASSED
diff alice.txt alice.data.SHA256
smime.sh: #7146: Compare Attached Signed Data and Original (SHA256) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------
cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256
smime.sh: #7147: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #7148: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------
cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256
smime.sh: #7149: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256
smime.sh: #7150: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED
diff alice.txt alice-ec.data.SHA256
smime.sh: #7151: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Detached Message {SHA384} ------------------
cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384
smime.sh: #7152: Create Detached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #7153: Verifying Alice's Detached Signature (SHA384) . - PASSED
smime.sh: Signing Attached Message (SHA384) ------------------
cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384
smime.sh: #7154: Create Attached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384
smime.sh: #7155: Decode Alice's Attached Signature (SHA384) . - PASSED
diff alice.txt alice.data.SHA384
smime.sh: #7156: Compare Attached Signed Data and Original (SHA384) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------
cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384
smime.sh: #7157: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #7158: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------
cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384
smime.sh: #7159: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384
smime.sh: #7160: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED
diff alice.txt alice-ec.data.SHA384
smime.sh: #7161: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Detached Message {SHA512} ------------------
cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512
smime.sh: #7162: Create Detached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #7163: Verifying Alice's Detached Signature (SHA512) . - PASSED
smime.sh: Signing Attached Message (SHA512) ------------------
cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512
smime.sh: #7164: Create Attached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512
smime.sh: #7165: Decode Alice's Attached Signature (SHA512) . - PASSED
diff alice.txt alice.data.SHA512
smime.sh: #7166: Compare Attached Signed Data and Original (SHA512) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------
cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512
smime.sh: #7167: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #7168: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------
cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512
smime.sh: #7169: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512
smime.sh: #7170: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED
diff alice.txt alice-ec.data.SHA512
smime.sh: #7171: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED
smime.sh: Enveloped Data Tests ------------------------------
cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \
        -o alice.env
smime.sh: #7172: Create Enveloped Data Alice . - PASSED
cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1
smime.sh: #7173: Decode Enveloped Data Alice . - PASSED
diff alice.txt alice.data1
smime.sh: #7174: Compare Decoded Enveloped Data and Original . - PASSED
smime.sh: Testing multiple recipients ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \
        -r bob@bogus.com,dave@bogus.com
smime.sh: #7175: Create Multiple Recipients Enveloped Data Alice . - PASSED
smime.sh: Testing multiple email addrs ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \
        -r eve@bogus.net
smime.sh: #7176: Encrypt to a Multiple Email cert . - PASSED
cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2
smime.sh: #7177: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED
cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3
smime.sh: #7178: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED
cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4
smime.sh: #7179: Decrypt with a Multiple Email cert . - PASSED
smime.sh: #7180: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED
smime.sh: #7181: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED
smime.sh: #7182: Compare Decoded with Multiple Email cert . - PASSED
smime.sh: Sending CERTS-ONLY Message ------------------------------
cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \
        -d ../alicedir > co.der
smime.sh: #7183: Create Certs-Only Alice . - PASSED
cmsutil -D -i co.der -d ../bobdir
smime.sh: #7184: Verify Certs-Only by CA . - PASSED
smime.sh: Encrypted-Data Message ---------------------------------
cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \
        -r "bob@bogus.com" > alice.enc
smime.sh: #7185: Create Encrypted-Data . - PASSED
cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \
        -o alice.data2
smime.sh: #7186: Decode Encrypted-Data . - PASSED
smime.sh: #7187: Compare Decoded and Original Data . - PASSED
smime.sh: p7 util Data Tests ------------------------------
p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env
smime.sh: #7188: Creating envelope for user Alice . - PASSED
p7content -d ../alicedir -i alice.env -o alice_p7.data
smime.sh: #7189: Verifying file delivered to user Alice . - PASSED
diff alice.txt alice_p7.data.sed
smime.sh: #7190: Compare Decoded Enveloped Data and Original . - PASSED
p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e
smime.sh: #7191: Signing file for user Alice . - PASSED
p7verify -d ../alicedir -c alice.txt -s alice.sig
Signature is valid.
smime.sh: #7192: Verifying file delivered to user Alice . - PASSED
TIMESTAMP smime END: Tue Nov 27 19:20:12 EST 2012
Running tests for ssl
TIMESTAMP ssl BEGIN: Tue Nov 27 19:20:12 EST 2012
ssl.sh: SSL tests ===============================
ssl.sh: CRL SSL Client Tests   - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:12 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24576 >/dev/null 2>/dev/null
selfserv with PID 24576 found at Tue Nov 27 19:20:12 EST 2012
selfserv with PID 24576 started at Tue Nov 27 19:20:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7193: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24576 at Tue Nov 27 19:20:13 EST 2012
kill -USR1 24576
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24576 killed at Tue Nov 27 19:20:13 EST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:13 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24634 >/dev/null 2>/dev/null
selfserv with PID 24634 found at Tue Nov 27 19:20:13 EST 2012
selfserv with PID 24634 started at Tue Nov 27 19:20:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7194: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24634 at Tue Nov 27 19:20:13 EST 2012
kill -USR1 24634
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24634 killed at Tue Nov 27 19:20:13 EST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:13 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24692 >/dev/null 2>/dev/null
selfserv with PID 24692 found at Tue Nov 27 19:20:13 EST 2012
selfserv with PID 24692 started at Tue Nov 27 19:20:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7195: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24692 at Tue Nov 27 19:20:14 EST 2012
kill -USR1 24692
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24692 killed at Tue Nov 27 19:20:14 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:20:14 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24762 >/dev/null 2>/dev/null
selfserv with PID 24762 found at Tue Nov 27 19:20:14 EST 2012
selfserv with PID 24762 started at Tue Nov 27 19:20:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7196: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24762 at Tue Nov 27 19:20:14 EST 2012
kill -USR1 24762
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24762 killed at Tue Nov 27 19:20:14 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:20:14 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24820 >/dev/null 2>/dev/null
selfserv with PID 24820 found at Tue Nov 27 19:20:14 EST 2012
selfserv with PID 24820 started at Tue Nov 27 19:20:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7197: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24820 at Tue Nov 27 19:20:14 EST 2012
kill -USR1 24820
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24820 killed at Tue Nov 27 19:20:14 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:20:14 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24878 >/dev/null 2>/dev/null
selfserv with PID 24878 found at Tue Nov 27 19:20:14 EST 2012
selfserv with PID 24878 started at Tue Nov 27 19:20:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7198: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24878 at Tue Nov 27 19:20:15 EST 2012
kill -USR1 24878
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24878 killed at Tue Nov 27 19:20:15 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:20:15 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24948 >/dev/null 2>/dev/null
selfserv with PID 24948 found at Tue Nov 27 19:20:15 EST 2012
selfserv with PID 24948 started at Tue Nov 27 19:20:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7199: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24948 at Tue Nov 27 19:20:15 EST 2012
kill -USR1 24948
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24948 killed at Tue Nov 27 19:20:15 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:20:15 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25006 >/dev/null 2>/dev/null
selfserv with PID 25006 found at Tue Nov 27 19:20:15 EST 2012
selfserv with PID 25006 started at Tue Nov 27 19:20:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7200: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25006 at Tue Nov 27 19:20:16 EST 2012
kill -USR1 25006
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25006 killed at Tue Nov 27 19:20:16 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:20:16 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25064 >/dev/null 2>/dev/null
selfserv with PID 25064 found at Tue Nov 27 19:20:16 EST 2012
selfserv with PID 25064 started at Tue Nov 27 19:20:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7201: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25064 at Tue Nov 27 19:20:16 EST 2012
kill -USR1 25064
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25064 killed at Tue Nov 27 19:20:16 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:16 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25134 >/dev/null 2>/dev/null
selfserv with PID 25134 found at Tue Nov 27 19:20:16 EST 2012
selfserv with PID 25134 started at Tue Nov 27 19:20:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7202: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25134 at Tue Nov 27 19:20:16 EST 2012
kill -USR1 25134
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25134 killed at Tue Nov 27 19:20:16 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:16 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25192 >/dev/null 2>/dev/null
selfserv with PID 25192 found at Tue Nov 27 19:20:16 EST 2012
selfserv with PID 25192 started at Tue Nov 27 19:20:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7203: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25192 at Tue Nov 27 19:20:17 EST 2012
kill -USR1 25192
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25192 killed at Tue Nov 27 19:20:17 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:17 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25250 >/dev/null 2>/dev/null
selfserv with PID 25250 found at Tue Nov 27 19:20:17 EST 2012
selfserv with PID 25250 started at Tue Nov 27 19:20:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7204: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25250 at Tue Nov 27 19:20:17 EST 2012
kill -USR1 25250
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25250 killed at Tue Nov 27 19:20:17 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:20:17 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25320 >/dev/null 2>/dev/null
selfserv with PID 25320 found at Tue Nov 27 19:20:17 EST 2012
selfserv with PID 25320 started at Tue Nov 27 19:20:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7205: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25320 at Tue Nov 27 19:20:18 EST 2012
kill -USR1 25320
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25320 killed at Tue Nov 27 19:20:18 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:20:18 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25378 >/dev/null 2>/dev/null
selfserv with PID 25378 found at Tue Nov 27 19:20:18 EST 2012
selfserv with PID 25378 started at Tue Nov 27 19:20:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7206: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25378 at Tue Nov 27 19:20:18 EST 2012
kill -USR1 25378
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25378 killed at Tue Nov 27 19:20:18 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:20:18 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25436 >/dev/null 2>/dev/null
selfserv with PID 25436 found at Tue Nov 27 19:20:18 EST 2012
selfserv with PID 25436 started at Tue Nov 27 19:20:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7207: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25436 at Tue Nov 27 19:20:18 EST 2012
kill -USR1 25436
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25436 killed at Tue Nov 27 19:20:18 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:20:18 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25506 >/dev/null 2>/dev/null
selfserv with PID 25506 found at Tue Nov 27 19:20:19 EST 2012
selfserv with PID 25506 started at Tue Nov 27 19:20:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7208: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25506 at Tue Nov 27 19:20:19 EST 2012
kill -USR1 25506
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25506 killed at Tue Nov 27 19:20:19 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:20:19 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25564 >/dev/null 2>/dev/null
selfserv with PID 25564 found at Tue Nov 27 19:20:19 EST 2012
selfserv with PID 25564 started at Tue Nov 27 19:20:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7209: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25564 at Tue Nov 27 19:20:19 EST 2012
kill -USR1 25564
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25564 killed at Tue Nov 27 19:20:19 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:20:19 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25622 >/dev/null 2>/dev/null
selfserv with PID 25622 found at Tue Nov 27 19:20:19 EST 2012
selfserv with PID 25622 started at Tue Nov 27 19:20:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7210: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 25622 at Tue Nov 27 19:20:20 EST 2012
kill -USR1 25622
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25622 killed at Tue Nov 27 19:20:20 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:20 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25692 >/dev/null 2>/dev/null
selfserv with PID 25692 found at Tue Nov 27 19:20:20 EST 2012
selfserv with PID 25692 started at Tue Nov 27 19:20:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7211: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25692 at Tue Nov 27 19:20:20 EST 2012
kill -USR1 25692
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25692 killed at Tue Nov 27 19:20:20 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:20 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25750 >/dev/null 2>/dev/null
selfserv with PID 25750 found at Tue Nov 27 19:20:20 EST 2012
selfserv with PID 25750 started at Tue Nov 27 19:20:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7212: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25750 at Tue Nov 27 19:20:20 EST 2012
kill -USR1 25750
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25750 killed at Tue Nov 27 19:20:20 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:20 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25808 >/dev/null 2>/dev/null
selfserv with PID 25808 found at Tue Nov 27 19:20:21 EST 2012
selfserv with PID 25808 started at Tue Nov 27 19:20:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7213: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25808 at Tue Nov 27 19:20:21 EST 2012
kill -USR1 25808
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25808 killed at Tue Nov 27 19:20:21 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:20:21 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25878 >/dev/null 2>/dev/null
selfserv with PID 25878 found at Tue Nov 27 19:20:21 EST 2012
selfserv with PID 25878 started at Tue Nov 27 19:20:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7214: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25878 at Tue Nov 27 19:20:21 EST 2012
kill -USR1 25878
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25878 killed at Tue Nov 27 19:20:21 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:20:21 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25936 >/dev/null 2>/dev/null
selfserv with PID 25936 found at Tue Nov 27 19:20:21 EST 2012
selfserv with PID 25936 started at Tue Nov 27 19:20:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7215: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25936 at Tue Nov 27 19:20:22 EST 2012
kill -USR1 25936
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25936 killed at Tue Nov 27 19:20:22 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:20:22 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25994 >/dev/null 2>/dev/null
selfserv with PID 25994 found at Tue Nov 27 19:20:22 EST 2012
selfserv with PID 25994 started at Tue Nov 27 19:20:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7216: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 25994 at Tue Nov 27 19:20:22 EST 2012
kill -USR1 25994
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25994 killed at Tue Nov 27 19:20:22 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:20:22 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26064 >/dev/null 2>/dev/null
selfserv with PID 26064 found at Tue Nov 27 19:20:22 EST 2012
selfserv with PID 26064 started at Tue Nov 27 19:20:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7217: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 26064 at Tue Nov 27 19:20:23 EST 2012
kill -USR1 26064
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26064 killed at Tue Nov 27 19:20:23 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:20:23 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26122 >/dev/null 2>/dev/null
selfserv with PID 26122 found at Tue Nov 27 19:20:23 EST 2012
selfserv with PID 26122 started at Tue Nov 27 19:20:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7218: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26122 at Tue Nov 27 19:20:23 EST 2012
kill -USR1 26122
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26122 killed at Tue Nov 27 19:20:23 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:20:23 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26180 >/dev/null 2>/dev/null
selfserv with PID 26180 found at Tue Nov 27 19:20:23 EST 2012
selfserv with PID 26180 started at Tue Nov 27 19:20:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7219: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 26180 at Tue Nov 27 19:20:23 EST 2012
kill -USR1 26180
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26180 killed at Tue Nov 27 19:20:23 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:23 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26250 >/dev/null 2>/dev/null
selfserv with PID 26250 found at Tue Nov 27 19:20:24 EST 2012
selfserv with PID 26250 started at Tue Nov 27 19:20:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7220: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 26250 at Tue Nov 27 19:20:24 EST 2012
kill -USR1 26250
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26250 killed at Tue Nov 27 19:20:24 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:24 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26308 >/dev/null 2>/dev/null
selfserv with PID 26308 found at Tue Nov 27 19:20:24 EST 2012
selfserv with PID 26308 started at Tue Nov 27 19:20:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7221: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 26308 at Tue Nov 27 19:20:24 EST 2012
kill -USR1 26308
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26308 killed at Tue Nov 27 19:20:24 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:24 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26366 >/dev/null 2>/dev/null
selfserv with PID 26366 found at Tue Nov 27 19:20:24 EST 2012
selfserv with PID 26366 started at Tue Nov 27 19:20:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7222: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 26366 at Tue Nov 27 19:20:25 EST 2012
kill -USR1 26366
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26366 killed at Tue Nov 27 19:20:25 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:20:25 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26436 >/dev/null 2>/dev/null
selfserv with PID 26436 found at Tue Nov 27 19:20:25 EST 2012
selfserv with PID 26436 started at Tue Nov 27 19:20:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7223: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 26436 at Tue Nov 27 19:20:25 EST 2012
kill -USR1 26436
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26436 killed at Tue Nov 27 19:20:25 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:20:25 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26494 >/dev/null 2>/dev/null
selfserv with PID 26494 found at Tue Nov 27 19:20:25 EST 2012
selfserv with PID 26494 started at Tue Nov 27 19:20:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7224: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 26494 at Tue Nov 27 19:20:25 EST 2012
kill -USR1 26494
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26494 killed at Tue Nov 27 19:20:25 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:20:25 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26552 >/dev/null 2>/dev/null
selfserv with PID 26552 found at Tue Nov 27 19:20:25 EST 2012
selfserv with PID 26552 started at Tue Nov 27 19:20:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7225: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 26552 at Tue Nov 27 19:20:26 EST 2012
kill -USR1 26552
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26552 killed at Tue Nov 27 19:20:26 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:20:26 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26622 >/dev/null 2>/dev/null
selfserv with PID 26622 found at Tue Nov 27 19:20:26 EST 2012
selfserv with PID 26622 started at Tue Nov 27 19:20:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7226: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 26622 at Tue Nov 27 19:20:26 EST 2012
kill -USR1 26622
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26622 killed at Tue Nov 27 19:20:26 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:20:26 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26680 >/dev/null 2>/dev/null
selfserv with PID 26680 found at Tue Nov 27 19:20:26 EST 2012
selfserv with PID 26680 started at Tue Nov 27 19:20:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7227: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26680 at Tue Nov 27 19:20:27 EST 2012
kill -USR1 26680
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26680 killed at Tue Nov 27 19:20:27 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:20:27 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26738 >/dev/null 2>/dev/null
selfserv with PID 26738 found at Tue Nov 27 19:20:27 EST 2012
selfserv with PID 26738 started at Tue Nov 27 19:20:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7228: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 26738 at Tue Nov 27 19:20:27 EST 2012
kill -USR1 26738
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26738 killed at Tue Nov 27 19:20:27 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:27 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26808 >/dev/null 2>/dev/null
selfserv with PID 26808 found at Tue Nov 27 19:20:27 EST 2012
selfserv with PID 26808 started at Tue Nov 27 19:20:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7229: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26808 at Tue Nov 27 19:20:27 EST 2012
kill -USR1 26808
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26808 killed at Tue Nov 27 19:20:27 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:27 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26866 >/dev/null 2>/dev/null
selfserv with PID 26866 found at Tue Nov 27 19:20:27 EST 2012
selfserv with PID 26866 started at Tue Nov 27 19:20:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7230: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26866 at Tue Nov 27 19:20:28 EST 2012
kill -USR1 26866
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26866 killed at Tue Nov 27 19:20:28 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26924 >/dev/null 2>/dev/null
selfserv with PID 26924 found at Tue Nov 27 19:20:28 EST 2012
selfserv with PID 26924 started at Tue Nov 27 19:20:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7231: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26924 at Tue Nov 27 19:20:28 EST 2012
kill -USR1 26924
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26924 killed at Tue Nov 27 19:20:28 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:20:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26994 >/dev/null 2>/dev/null
selfserv with PID 26994 found at Tue Nov 27 19:20:28 EST 2012
selfserv with PID 26994 started at Tue Nov 27 19:20:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7232: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 26994 at Tue Nov 27 19:20:29 EST 2012
kill -USR1 26994
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26994 killed at Tue Nov 27 19:20:29 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:20:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27052 >/dev/null 2>/dev/null
selfserv with PID 27052 found at Tue Nov 27 19:20:29 EST 2012
selfserv with PID 27052 started at Tue Nov 27 19:20:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7233: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27052 at Tue Nov 27 19:20:29 EST 2012
kill -USR1 27052
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27052 killed at Tue Nov 27 19:20:29 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:20:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27110 >/dev/null 2>/dev/null
selfserv with PID 27110 found at Tue Nov 27 19:20:29 EST 2012
selfserv with PID 27110 started at Tue Nov 27 19:20:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7234: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27110 at Tue Nov 27 19:20:29 EST 2012
kill -USR1 27110
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27110 killed at Tue Nov 27 19:20:29 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:20:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27180 >/dev/null 2>/dev/null
selfserv with PID 27180 found at Tue Nov 27 19:20:30 EST 2012
selfserv with PID 27180 started at Tue Nov 27 19:20:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7235: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27180 at Tue Nov 27 19:20:30 EST 2012
kill -USR1 27180
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27180 killed at Tue Nov 27 19:20:30 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:20:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27239 >/dev/null 2>/dev/null
selfserv with PID 27239 found at Tue Nov 27 19:20:30 EST 2012
selfserv with PID 27239 started at Tue Nov 27 19:20:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7236: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27239 at Tue Nov 27 19:20:30 EST 2012
kill -USR1 27239
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27239 killed at Tue Nov 27 19:20:30 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:20:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27297 >/dev/null 2>/dev/null
selfserv with PID 27297 found at Tue Nov 27 19:20:30 EST 2012
selfserv with PID 27297 started at Tue Nov 27 19:20:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7237: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27297 at Tue Nov 27 19:20:31 EST 2012
kill -USR1 27297
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27297 killed at Tue Nov 27 19:20:31 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:31 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27367 >/dev/null 2>/dev/null
selfserv with PID 27367 found at Tue Nov 27 19:20:31 EST 2012
selfserv with PID 27367 started at Tue Nov 27 19:20:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7238: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27367 at Tue Nov 27 19:20:31 EST 2012
kill -USR1 27367
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27367 killed at Tue Nov 27 19:20:31 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:31 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27425 >/dev/null 2>/dev/null
selfserv with PID 27425 found at Tue Nov 27 19:20:31 EST 2012
selfserv with PID 27425 started at Tue Nov 27 19:20:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7239: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27425 at Tue Nov 27 19:20:32 EST 2012
kill -USR1 27425
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27425 killed at Tue Nov 27 19:20:32 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:32 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27483 >/dev/null 2>/dev/null
selfserv with PID 27483 found at Tue Nov 27 19:20:32 EST 2012
selfserv with PID 27483 started at Tue Nov 27 19:20:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7240: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27483 at Tue Nov 27 19:20:32 EST 2012
kill -USR1 27483
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27483 killed at Tue Nov 27 19:20:32 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:20:32 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27553 >/dev/null 2>/dev/null
selfserv with PID 27553 found at Tue Nov 27 19:20:32 EST 2012
selfserv with PID 27553 started at Tue Nov 27 19:20:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7241: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27553 at Tue Nov 27 19:20:32 EST 2012
kill -USR1 27553
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27553 killed at Tue Nov 27 19:20:32 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:20:32 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27611 >/dev/null 2>/dev/null
selfserv with PID 27611 found at Tue Nov 27 19:20:32 EST 2012
selfserv with PID 27611 started at Tue Nov 27 19:20:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7242: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27611 at Tue Nov 27 19:20:33 EST 2012
kill -USR1 27611
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27611 killed at Tue Nov 27 19:20:33 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:20:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27669 >/dev/null 2>/dev/null
selfserv with PID 27669 found at Tue Nov 27 19:20:33 EST 2012
selfserv with PID 27669 started at Tue Nov 27 19:20:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7243: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27669 at Tue Nov 27 19:20:33 EST 2012
kill -USR1 27669
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27669 killed at Tue Nov 27 19:20:33 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:20:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27739 >/dev/null 2>/dev/null
selfserv with PID 27739 found at Tue Nov 27 19:20:33 EST 2012
selfserv with PID 27739 started at Tue Nov 27 19:20:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7244: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27739 at Tue Nov 27 19:20:34 EST 2012
kill -USR1 27739
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27739 killed at Tue Nov 27 19:20:34 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:20:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27797 >/dev/null 2>/dev/null
selfserv with PID 27797 found at Tue Nov 27 19:20:34 EST 2012
selfserv with PID 27797 started at Tue Nov 27 19:20:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7245: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27797 at Tue Nov 27 19:20:34 EST 2012
kill -USR1 27797
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27797 killed at Tue Nov 27 19:20:34 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:20:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27855 >/dev/null 2>/dev/null
selfserv with PID 27855 found at Tue Nov 27 19:20:34 EST 2012
selfserv with PID 27855 started at Tue Nov 27 19:20:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7246: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27855 at Tue Nov 27 19:20:35 EST 2012
kill -USR1 27855
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27855 killed at Tue Nov 27 19:20:35 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27925 >/dev/null 2>/dev/null
selfserv with PID 27925 found at Tue Nov 27 19:20:35 EST 2012
selfserv with PID 27925 started at Tue Nov 27 19:20:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7247: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27925 at Tue Nov 27 19:20:35 EST 2012
kill -USR1 27925
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27925 killed at Tue Nov 27 19:20:35 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27983 >/dev/null 2>/dev/null
selfserv with PID 27983 found at Tue Nov 27 19:20:35 EST 2012
selfserv with PID 27983 started at Tue Nov 27 19:20:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7248: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 27983 at Tue Nov 27 19:20:35 EST 2012
kill -USR1 27983
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27983 killed at Tue Nov 27 19:20:35 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28041 >/dev/null 2>/dev/null
selfserv with PID 28041 found at Tue Nov 27 19:20:35 EST 2012
selfserv with PID 28041 started at Tue Nov 27 19:20:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7249: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28041 at Tue Nov 27 19:20:36 EST 2012
kill -USR1 28041
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28041 killed at Tue Nov 27 19:20:36 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:20:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28111 >/dev/null 2>/dev/null
selfserv with PID 28111 found at Tue Nov 27 19:20:36 EST 2012
selfserv with PID 28111 started at Tue Nov 27 19:20:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7250: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28111 at Tue Nov 27 19:20:36 EST 2012
kill -USR1 28111
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28111 killed at Tue Nov 27 19:20:36 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:20:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28169 >/dev/null 2>/dev/null
selfserv with PID 28169 found at Tue Nov 27 19:20:36 EST 2012
selfserv with PID 28169 started at Tue Nov 27 19:20:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7251: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28169 at Tue Nov 27 19:20:37 EST 2012
kill -USR1 28169
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28169 killed at Tue Nov 27 19:20:37 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:20:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28227 >/dev/null 2>/dev/null
selfserv with PID 28227 found at Tue Nov 27 19:20:37 EST 2012
selfserv with PID 28227 started at Tue Nov 27 19:20:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7252: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28227 at Tue Nov 27 19:20:37 EST 2012
kill -USR1 28227
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28227 killed at Tue Nov 27 19:20:37 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:20:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28297 >/dev/null 2>/dev/null
selfserv with PID 28297 found at Tue Nov 27 19:20:37 EST 2012
selfserv with PID 28297 started at Tue Nov 27 19:20:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7253: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28297 at Tue Nov 27 19:20:37 EST 2012
kill -USR1 28297
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28297 killed at Tue Nov 27 19:20:37 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:20:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28355 >/dev/null 2>/dev/null
selfserv with PID 28355 found at Tue Nov 27 19:20:37 EST 2012
selfserv with PID 28355 started at Tue Nov 27 19:20:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7254: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28355 at Tue Nov 27 19:20:38 EST 2012
kill -USR1 28355
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28355 killed at Tue Nov 27 19:20:38 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:20:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28413 >/dev/null 2>/dev/null
selfserv with PID 28413 found at Tue Nov 27 19:20:38 EST 2012
selfserv with PID 28413 started at Tue Nov 27 19:20:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7255: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28413 at Tue Nov 27 19:20:38 EST 2012
kill -USR1 28413
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28413 killed at Tue Nov 27 19:20:38 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28483 >/dev/null 2>/dev/null
selfserv with PID 28483 found at Tue Nov 27 19:20:38 EST 2012
selfserv with PID 28483 started at Tue Nov 27 19:20:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7256: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28483 at Tue Nov 27 19:20:39 EST 2012
kill -USR1 28483
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28483 killed at Tue Nov 27 19:20:39 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28541 >/dev/null 2>/dev/null
selfserv with PID 28541 found at Tue Nov 27 19:20:39 EST 2012
selfserv with PID 28541 started at Tue Nov 27 19:20:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7257: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28541 at Tue Nov 27 19:20:39 EST 2012
kill -USR1 28541
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28541 killed at Tue Nov 27 19:20:39 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28599 >/dev/null 2>/dev/null
selfserv with PID 28599 found at Tue Nov 27 19:20:39 EST 2012
selfserv with PID 28599 started at Tue Nov 27 19:20:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7258: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28599 at Tue Nov 27 19:20:39 EST 2012
kill -USR1 28599
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28599 killed at Tue Nov 27 19:20:39 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:20:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28669 >/dev/null 2>/dev/null
selfserv with PID 28669 found at Tue Nov 27 19:20:40 EST 2012
selfserv with PID 28669 started at Tue Nov 27 19:20:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7259: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28669 at Tue Nov 27 19:20:40 EST 2012
kill -USR1 28669
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28669 killed at Tue Nov 27 19:20:40 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:20:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28727 >/dev/null 2>/dev/null
selfserv with PID 28727 found at Tue Nov 27 19:20:40 EST 2012
selfserv with PID 28727 started at Tue Nov 27 19:20:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7260: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28727 at Tue Nov 27 19:20:40 EST 2012
kill -USR1 28727
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28727 killed at Tue Nov 27 19:20:40 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:20:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28786 >/dev/null 2>/dev/null
selfserv with PID 28786 found at Tue Nov 27 19:20:40 EST 2012
selfserv with PID 28786 started at Tue Nov 27 19:20:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7261: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28786 at Tue Nov 27 19:20:41 EST 2012
kill -USR1 28786
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28786 killed at Tue Nov 27 19:20:41 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:20:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28856 >/dev/null 2>/dev/null
selfserv with PID 28856 found at Tue Nov 27 19:20:41 EST 2012
selfserv with PID 28856 started at Tue Nov 27 19:20:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7262: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28856 at Tue Nov 27 19:20:41 EST 2012
kill -USR1 28856
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28856 killed at Tue Nov 27 19:20:41 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:20:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28914 >/dev/null 2>/dev/null
selfserv with PID 28914 found at Tue Nov 27 19:20:41 EST 2012
selfserv with PID 28914 started at Tue Nov 27 19:20:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7263: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 28914 at Tue Nov 27 19:20:41 EST 2012
kill -USR1 28914
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28914 killed at Tue Nov 27 19:20:42 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:20:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28972 >/dev/null 2>/dev/null
selfserv with PID 28972 found at Tue Nov 27 19:20:42 EST 2012
selfserv with PID 28972 started at Tue Nov 27 19:20:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7264: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 28972 at Tue Nov 27 19:20:42 EST 2012
kill -USR1 28972
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28972 killed at Tue Nov 27 19:20:42 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29042 >/dev/null 2>/dev/null
selfserv with PID 29042 found at Tue Nov 27 19:20:42 EST 2012
selfserv with PID 29042 started at Tue Nov 27 19:20:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7265: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29042 at Tue Nov 27 19:20:42 EST 2012
kill -USR1 29042
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29042 killed at Tue Nov 27 19:20:42 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29100 >/dev/null 2>/dev/null
selfserv with PID 29100 found at Tue Nov 27 19:20:42 EST 2012
selfserv with PID 29100 started at Tue Nov 27 19:20:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7266: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29100 at Tue Nov 27 19:20:43 EST 2012
kill -USR1 29100
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29100 killed at Tue Nov 27 19:20:43 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29158 >/dev/null 2>/dev/null
selfserv with PID 29158 found at Tue Nov 27 19:20:43 EST 2012
selfserv with PID 29158 started at Tue Nov 27 19:20:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7267: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29158 at Tue Nov 27 19:20:43 EST 2012
kill -USR1 29158
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29158 killed at Tue Nov 27 19:20:43 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:20:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29228 >/dev/null 2>/dev/null
selfserv with PID 29228 found at Tue Nov 27 19:20:43 EST 2012
selfserv with PID 29228 started at Tue Nov 27 19:20:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7268: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29228 at Tue Nov 27 19:20:44 EST 2012
kill -USR1 29228
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29228 killed at Tue Nov 27 19:20:44 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:20:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29286 >/dev/null 2>/dev/null
selfserv with PID 29286 found at Tue Nov 27 19:20:44 EST 2012
selfserv with PID 29286 started at Tue Nov 27 19:20:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7269: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29286 at Tue Nov 27 19:20:44 EST 2012
kill -USR1 29286
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29286 killed at Tue Nov 27 19:20:44 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:20:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29344 >/dev/null 2>/dev/null
selfserv with PID 29344 found at Tue Nov 27 19:20:44 EST 2012
selfserv with PID 29344 started at Tue Nov 27 19:20:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7270: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29344 at Tue Nov 27 19:20:44 EST 2012
kill -USR1 29344
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29344 killed at Tue Nov 27 19:20:44 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:20:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29414 >/dev/null 2>/dev/null
selfserv with PID 29414 found at Tue Nov 27 19:20:44 EST 2012
selfserv with PID 29414 started at Tue Nov 27 19:20:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7271: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29414 at Tue Nov 27 19:20:45 EST 2012
kill -USR1 29414
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29414 killed at Tue Nov 27 19:20:45 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:20:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29472 >/dev/null 2>/dev/null
selfserv with PID 29472 found at Tue Nov 27 19:20:45 EST 2012
selfserv with PID 29472 started at Tue Nov 27 19:20:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7272: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29472 at Tue Nov 27 19:20:45 EST 2012
kill -USR1 29472
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29472 killed at Tue Nov 27 19:20:45 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:20:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29531 >/dev/null 2>/dev/null
selfserv with PID 29531 found at Tue Nov 27 19:20:45 EST 2012
selfserv with PID 29531 started at Tue Nov 27 19:20:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7273: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29531 at Tue Nov 27 19:20:46 EST 2012
kill -USR1 29531
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29531 killed at Tue Nov 27 19:20:46 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29601 >/dev/null 2>/dev/null
selfserv with PID 29601 found at Tue Nov 27 19:20:46 EST 2012
selfserv with PID 29601 started at Tue Nov 27 19:20:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7274: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29601 at Tue Nov 27 19:20:46 EST 2012
kill -USR1 29601
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29601 killed at Tue Nov 27 19:20:46 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29659 >/dev/null 2>/dev/null
selfserv with PID 29659 found at Tue Nov 27 19:20:46 EST 2012
selfserv with PID 29659 started at Tue Nov 27 19:20:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7275: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29659 at Tue Nov 27 19:20:46 EST 2012
kill -USR1 29659
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29659 killed at Tue Nov 27 19:20:46 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:20:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29717 >/dev/null 2>/dev/null
selfserv with PID 29717 found at Tue Nov 27 19:20:46 EST 2012
selfserv with PID 29717 started at Tue Nov 27 19:20:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7276: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29717 at Tue Nov 27 19:20:47 EST 2012
kill -USR1 29717
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29717 killed at Tue Nov 27 19:20:47 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:20:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29787 >/dev/null 2>/dev/null
selfserv with PID 29787 found at Tue Nov 27 19:20:47 EST 2012
selfserv with PID 29787 started at Tue Nov 27 19:20:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7277: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29787 at Tue Nov 27 19:20:47 EST 2012
kill -USR1 29787
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29787 killed at Tue Nov 27 19:20:47 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:20:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29845 >/dev/null 2>/dev/null
selfserv with PID 29845 found at Tue Nov 27 19:20:47 EST 2012
selfserv with PID 29845 started at Tue Nov 27 19:20:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7278: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29845 at Tue Nov 27 19:20:48 EST 2012
kill -USR1 29845
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29845 killed at Tue Nov 27 19:20:48 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:20:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29903 >/dev/null 2>/dev/null
selfserv with PID 29903 found at Tue Nov 27 19:20:48 EST 2012
selfserv with PID 29903 started at Tue Nov 27 19:20:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7279: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29903 at Tue Nov 27 19:20:48 EST 2012
kill -USR1 29903
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29903 killed at Tue Nov 27 19:20:48 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:20:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29973 >/dev/null 2>/dev/null
selfserv with PID 29973 found at Tue Nov 27 19:20:48 EST 2012
selfserv with PID 29973 started at Tue Nov 27 19:20:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7280: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29973 at Tue Nov 27 19:20:48 EST 2012
kill -USR1 29973
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29973 killed at Tue Nov 27 19:20:48 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:20:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30031 >/dev/null 2>/dev/null
selfserv with PID 30031 found at Tue Nov 27 19:20:48 EST 2012
selfserv with PID 30031 started at Tue Nov 27 19:20:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7281: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30031 at Tue Nov 27 19:20:49 EST 2012
kill -USR1 30031
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30031 killed at Tue Nov 27 19:20:49 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:20:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30089 >/dev/null 2>/dev/null
selfserv with PID 30089 found at Tue Nov 27 19:20:49 EST 2012
selfserv with PID 30089 started at Tue Nov 27 19:20:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7282: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30089 at Tue Nov 27 19:20:49 EST 2012
kill -USR1 30089
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30089 killed at Tue Nov 27 19:20:49 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:20:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30168 >/dev/null 2>/dev/null
selfserv with PID 30168 found at Tue Nov 27 19:20:49 EST 2012
selfserv with PID 30168 started at Tue Nov 27 19:20:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7283: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30168 at Tue Nov 27 19:20:50 EST 2012
kill -USR1 30168
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30168 killed at Tue Nov 27 19:20:50 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:20:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30226 >/dev/null 2>/dev/null
selfserv with PID 30226 found at Tue Nov 27 19:20:50 EST 2012
selfserv with PID 30226 started at Tue Nov 27 19:20:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7284: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30226 at Tue Nov 27 19:20:50 EST 2012
kill -USR1 30226
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30226 killed at Tue Nov 27 19:20:50 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:20:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30284 >/dev/null 2>/dev/null
selfserv with PID 30284 found at Tue Nov 27 19:20:50 EST 2012
selfserv with PID 30284 started at Tue Nov 27 19:20:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7285: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30284 at Tue Nov 27 19:20:50 EST 2012
kill -USR1 30284
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30284 killed at Tue Nov 27 19:20:50 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:20:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30354 >/dev/null 2>/dev/null
selfserv with PID 30354 found at Tue Nov 27 19:20:50 EST 2012
selfserv with PID 30354 started at Tue Nov 27 19:20:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7286: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30354 at Tue Nov 27 19:20:51 EST 2012
kill -USR1 30354
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30354 killed at Tue Nov 27 19:20:51 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:20:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30412 >/dev/null 2>/dev/null
selfserv with PID 30412 found at Tue Nov 27 19:20:51 EST 2012
selfserv with PID 30412 started at Tue Nov 27 19:20:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7287: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30412 at Tue Nov 27 19:20:51 EST 2012
kill -USR1 30412
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30412 killed at Tue Nov 27 19:20:51 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:20:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30470 >/dev/null 2>/dev/null
selfserv with PID 30470 found at Tue Nov 27 19:20:51 EST 2012
selfserv with PID 30470 started at Tue Nov 27 19:20:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7288: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30470 at Tue Nov 27 19:20:52 EST 2012
kill -USR1 30470
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30470 killed at Tue Nov 27 19:20:52 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:20:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30540 >/dev/null 2>/dev/null
selfserv with PID 30540 found at Tue Nov 27 19:20:52 EST 2012
selfserv with PID 30540 started at Tue Nov 27 19:20:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7289: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30540 at Tue Nov 27 19:20:52 EST 2012
kill -USR1 30540
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30540 killed at Tue Nov 27 19:20:52 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:20:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30598 >/dev/null 2>/dev/null
selfserv with PID 30598 found at Tue Nov 27 19:20:52 EST 2012
selfserv with PID 30598 started at Tue Nov 27 19:20:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7290: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30598 at Tue Nov 27 19:20:53 EST 2012
kill -USR1 30598
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30598 killed at Tue Nov 27 19:20:53 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:20:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30656 >/dev/null 2>/dev/null
selfserv with PID 30656 found at Tue Nov 27 19:20:53 EST 2012
selfserv with PID 30656 started at Tue Nov 27 19:20:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7291: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30656 at Tue Nov 27 19:20:53 EST 2012
kill -USR1 30656
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30656 killed at Tue Nov 27 19:20:53 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:20:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30726 >/dev/null 2>/dev/null
selfserv with PID 30726 found at Tue Nov 27 19:20:53 EST 2012
selfserv with PID 30726 started at Tue Nov 27 19:20:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7292: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30726 at Tue Nov 27 19:20:53 EST 2012
kill -USR1 30726
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30726 killed at Tue Nov 27 19:20:53 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:20:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30784 >/dev/null 2>/dev/null
selfserv with PID 30784 found at Tue Nov 27 19:20:53 EST 2012
selfserv with PID 30784 started at Tue Nov 27 19:20:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7293: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30784 at Tue Nov 27 19:20:54 EST 2012
kill -USR1 30784
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30784 killed at Tue Nov 27 19:20:54 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:20:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30842 >/dev/null 2>/dev/null
selfserv with PID 30842 found at Tue Nov 27 19:20:54 EST 2012
selfserv with PID 30842 started at Tue Nov 27 19:20:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7294: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 30842 at Tue Nov 27 19:20:54 EST 2012
kill -USR1 30842
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30842 killed at Tue Nov 27 19:20:54 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:20:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30912 >/dev/null 2>/dev/null
selfserv with PID 30912 found at Tue Nov 27 19:20:54 EST 2012
selfserv with PID 30912 started at Tue Nov 27 19:20:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7295: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30912 at Tue Nov 27 19:20:55 EST 2012
kill -USR1 30912
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30912 killed at Tue Nov 27 19:20:55 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:20:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30970 >/dev/null 2>/dev/null
selfserv with PID 30970 found at Tue Nov 27 19:20:55 EST 2012
selfserv with PID 30970 started at Tue Nov 27 19:20:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7296: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30970 at Tue Nov 27 19:20:55 EST 2012
kill -USR1 30970
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30970 killed at Tue Nov 27 19:20:55 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:20:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31028 >/dev/null 2>/dev/null
selfserv with PID 31028 found at Tue Nov 27 19:20:55 EST 2012
selfserv with PID 31028 started at Tue Nov 27 19:20:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7297: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31028 at Tue Nov 27 19:20:55 EST 2012
kill -USR1 31028
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31028 killed at Tue Nov 27 19:20:55 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:20:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31098 >/dev/null 2>/dev/null
selfserv with PID 31098 found at Tue Nov 27 19:20:55 EST 2012
selfserv with PID 31098 started at Tue Nov 27 19:20:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7298: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31098 at Tue Nov 27 19:20:56 EST 2012
kill -USR1 31098
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31098 killed at Tue Nov 27 19:20:56 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:20:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31156 >/dev/null 2>/dev/null
selfserv with PID 31156 found at Tue Nov 27 19:20:56 EST 2012
selfserv with PID 31156 started at Tue Nov 27 19:20:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7299: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31156 at Tue Nov 27 19:20:56 EST 2012
kill -USR1 31156
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31156 killed at Tue Nov 27 19:20:56 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:20:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31214 >/dev/null 2>/dev/null
selfserv with PID 31214 found at Tue Nov 27 19:20:56 EST 2012
selfserv with PID 31214 started at Tue Nov 27 19:20:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7300: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31214 at Tue Nov 27 19:20:57 EST 2012
kill -USR1 31214
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31214 killed at Tue Nov 27 19:20:57 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:20:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31284 >/dev/null 2>/dev/null
selfserv with PID 31284 found at Tue Nov 27 19:20:57 EST 2012
selfserv with PID 31284 started at Tue Nov 27 19:20:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7301: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31284 at Tue Nov 27 19:20:57 EST 2012
kill -USR1 31284
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31284 killed at Tue Nov 27 19:20:57 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:20:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31342 >/dev/null 2>/dev/null
selfserv with PID 31342 found at Tue Nov 27 19:20:57 EST 2012
selfserv with PID 31342 started at Tue Nov 27 19:20:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7302: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31342 at Tue Nov 27 19:20:58 EST 2012
kill -USR1 31342
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31342 killed at Tue Nov 27 19:20:58 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:20:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31400 >/dev/null 2>/dev/null
selfserv with PID 31400 found at Tue Nov 27 19:20:58 EST 2012
selfserv with PID 31400 started at Tue Nov 27 19:20:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #7303: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31400 at Tue Nov 27 19:20:58 EST 2012
kill -USR1 31400
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31400 killed at Tue Nov 27 19:20:58 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:20:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31470 >/dev/null 2>/dev/null
selfserv with PID 31470 found at Tue Nov 27 19:20:58 EST 2012
selfserv with PID 31470 started at Tue Nov 27 19:20:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7304: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31470 at Tue Nov 27 19:20:58 EST 2012
kill -USR1 31470
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31470 killed at Tue Nov 27 19:20:58 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:20:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31528 >/dev/null 2>/dev/null
selfserv with PID 31528 found at Tue Nov 27 19:20:58 EST 2012
selfserv with PID 31528 started at Tue Nov 27 19:20:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7305: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31528 at Tue Nov 27 19:20:59 EST 2012
kill -USR1 31528
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31528 killed at Tue Nov 27 19:20:59 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:20:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31586 >/dev/null 2>/dev/null
selfserv with PID 31586 found at Tue Nov 27 19:20:59 EST 2012
selfserv with PID 31586 started at Tue Nov 27 19:20:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #7306: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 31586 at Tue Nov 27 19:20:59 EST 2012
kill -USR1 31586
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31586 killed at Tue Nov 27 19:20:59 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:20:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:20:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31656 >/dev/null 2>/dev/null
selfserv with PID 31656 found at Tue Nov 27 19:20:59 EST 2012
selfserv with PID 31656 started at Tue Nov 27 19:20:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7307: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31656 at Tue Nov 27 19:21:00 EST 2012
kill -USR1 31656
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31656 killed at Tue Nov 27 19:21:00 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:21:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31714 >/dev/null 2>/dev/null
selfserv with PID 31714 found at Tue Nov 27 19:21:00 EST 2012
selfserv with PID 31714 started at Tue Nov 27 19:21:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7308: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31714 at Tue Nov 27 19:21:00 EST 2012
kill -USR1 31714
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31714 killed at Tue Nov 27 19:21:00 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:21:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31772 >/dev/null 2>/dev/null
selfserv with PID 31772 found at Tue Nov 27 19:21:00 EST 2012
selfserv with PID 31772 started at Tue Nov 27 19:21:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7309: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31772 at Tue Nov 27 19:21:00 EST 2012
kill -USR1 31772
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31772 killed at Tue Nov 27 19:21:00 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:21:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31842 >/dev/null 2>/dev/null
selfserv with PID 31842 found at Tue Nov 27 19:21:01 EST 2012
selfserv with PID 31842 started at Tue Nov 27 19:21:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7310: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31842 at Tue Nov 27 19:21:01 EST 2012
kill -USR1 31842
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31842 killed at Tue Nov 27 19:21:01 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:21:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31900 >/dev/null 2>/dev/null
selfserv with PID 31900 found at Tue Nov 27 19:21:01 EST 2012
selfserv with PID 31900 started at Tue Nov 27 19:21:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7311: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31900 at Tue Nov 27 19:21:01 EST 2012
kill -USR1 31900
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31900 killed at Tue Nov 27 19:21:01 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:21:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 31958 >/dev/null 2>/dev/null
selfserv with PID 31958 found at Tue Nov 27 19:21:01 EST 2012
selfserv with PID 31958 started at Tue Nov 27 19:21:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7312: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31958 at Tue Nov 27 19:21:02 EST 2012
kill -USR1 31958
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 31958 killed at Tue Nov 27 19:21:02 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:21:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32028 >/dev/null 2>/dev/null
selfserv with PID 32028 found at Tue Nov 27 19:21:02 EST 2012
selfserv with PID 32028 started at Tue Nov 27 19:21:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7313: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32028 at Tue Nov 27 19:21:02 EST 2012
kill -USR1 32028
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32028 killed at Tue Nov 27 19:21:02 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:21:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32086 >/dev/null 2>/dev/null
selfserv with PID 32086 found at Tue Nov 27 19:21:02 EST 2012
selfserv with PID 32086 started at Tue Nov 27 19:21:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7314: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32086 at Tue Nov 27 19:21:03 EST 2012
kill -USR1 32086
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32086 killed at Tue Nov 27 19:21:03 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:21:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32144 >/dev/null 2>/dev/null
selfserv with PID 32144 found at Tue Nov 27 19:21:03 EST 2012
selfserv with PID 32144 started at Tue Nov 27 19:21:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7315: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32144 at Tue Nov 27 19:21:03 EST 2012
kill -USR1 32144
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32144 killed at Tue Nov 27 19:21:03 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:21:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32214 >/dev/null 2>/dev/null
selfserv with PID 32214 found at Tue Nov 27 19:21:03 EST 2012
selfserv with PID 32214 started at Tue Nov 27 19:21:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7316: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32214 at Tue Nov 27 19:21:04 EST 2012
kill -USR1 32214
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32214 killed at Tue Nov 27 19:21:04 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:21:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32272 >/dev/null 2>/dev/null
selfserv with PID 32272 found at Tue Nov 27 19:21:04 EST 2012
selfserv with PID 32272 started at Tue Nov 27 19:21:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7317: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32272 at Tue Nov 27 19:21:04 EST 2012
kill -USR1 32272
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32272 killed at Tue Nov 27 19:21:04 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:21:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32331 >/dev/null 2>/dev/null
selfserv with PID 32331 found at Tue Nov 27 19:21:04 EST 2012
selfserv with PID 32331 started at Tue Nov 27 19:21:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7318: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32331 at Tue Nov 27 19:21:04 EST 2012
kill -USR1 32331
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32331 killed at Tue Nov 27 19:21:04 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:21:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32401 >/dev/null 2>/dev/null
selfserv with PID 32401 found at Tue Nov 27 19:21:05 EST 2012
selfserv with PID 32401 started at Tue Nov 27 19:21:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7319: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32401 at Tue Nov 27 19:21:05 EST 2012
kill -USR1 32401
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32401 killed at Tue Nov 27 19:21:05 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:21:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32459 >/dev/null 2>/dev/null
selfserv with PID 32459 found at Tue Nov 27 19:21:05 EST 2012
selfserv with PID 32459 started at Tue Nov 27 19:21:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7320: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32459 at Tue Nov 27 19:21:05 EST 2012
kill -USR1 32459
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32459 killed at Tue Nov 27 19:21:05 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:21:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32517 >/dev/null 2>/dev/null
selfserv with PID 32517 found at Tue Nov 27 19:21:05 EST 2012
selfserv with PID 32517 started at Tue Nov 27 19:21:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7321: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32517 at Tue Nov 27 19:21:06 EST 2012
kill -USR1 32517
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32517 killed at Tue Nov 27 19:21:06 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:21:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32587 >/dev/null 2>/dev/null
selfserv with PID 32587 found at Tue Nov 27 19:21:06 EST 2012
selfserv with PID 32587 started at Tue Nov 27 19:21:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7322: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32587 at Tue Nov 27 19:21:06 EST 2012
kill -USR1 32587
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32587 killed at Tue Nov 27 19:21:06 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:21:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32645 >/dev/null 2>/dev/null
selfserv with PID 32645 found at Tue Nov 27 19:21:06 EST 2012
selfserv with PID 32645 started at Tue Nov 27 19:21:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7323: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32645 at Tue Nov 27 19:21:07 EST 2012
kill -USR1 32645
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32645 killed at Tue Nov 27 19:21:07 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:21:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32703 >/dev/null 2>/dev/null
selfserv with PID 32703 found at Tue Nov 27 19:21:07 EST 2012
selfserv with PID 32703 started at Tue Nov 27 19:21:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7324: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32703 at Tue Nov 27 19:21:07 EST 2012
kill -USR1 32703
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32703 killed at Tue Nov 27 19:21:07 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:21:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 305 >/dev/null 2>/dev/null
selfserv with PID 305 found at Tue Nov 27 19:21:07 EST 2012
selfserv with PID 305 started at Tue Nov 27 19:21:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7325: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 305 at Tue Nov 27 19:21:08 EST 2012
kill -USR1 305
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 305 killed at Tue Nov 27 19:21:08 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:21:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 368 >/dev/null 2>/dev/null
selfserv with PID 368 found at Tue Nov 27 19:21:08 EST 2012
selfserv with PID 368 started at Tue Nov 27 19:21:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7326: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 368 at Tue Nov 27 19:21:08 EST 2012
kill -USR1 368
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 368 killed at Tue Nov 27 19:21:08 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:21:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 432 >/dev/null 2>/dev/null
selfserv with PID 432 found at Tue Nov 27 19:21:08 EST 2012
selfserv with PID 432 started at Tue Nov 27 19:21:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7327: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 432 at Tue Nov 27 19:21:08 EST 2012
kill -USR1 432
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 432 killed at Tue Nov 27 19:21:08 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:21:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 510 >/dev/null 2>/dev/null
selfserv with PID 510 found at Tue Nov 27 19:21:08 EST 2012
selfserv with PID 510 started at Tue Nov 27 19:21:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7328: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 510 at Tue Nov 27 19:21:09 EST 2012
kill -USR1 510
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 510 killed at Tue Nov 27 19:21:09 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:21:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 580 >/dev/null 2>/dev/null
selfserv with PID 580 found at Tue Nov 27 19:21:09 EST 2012
selfserv with PID 580 started at Tue Nov 27 19:21:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7329: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 580 at Tue Nov 27 19:21:09 EST 2012
kill -USR1 580
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 580 killed at Tue Nov 27 19:21:09 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:21:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 656 >/dev/null 2>/dev/null
selfserv with PID 656 found at Tue Nov 27 19:21:09 EST 2012
selfserv with PID 656 started at Tue Nov 27 19:21:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7330: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 656 at Tue Nov 27 19:21:10 EST 2012
kill -USR1 656
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 656 killed at Tue Nov 27 19:21:10 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:21:10 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 734 >/dev/null 2>/dev/null
selfserv with PID 734 found at Tue Nov 27 19:21:10 EST 2012
selfserv with PID 734 started at Tue Nov 27 19:21:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7331: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 734 at Tue Nov 27 19:21:10 EST 2012
kill -USR1 734
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 734 killed at Tue Nov 27 19:21:10 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:21:10 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 793 >/dev/null 2>/dev/null
selfserv with PID 793 found at Tue Nov 27 19:21:10 EST 2012
selfserv with PID 793 started at Tue Nov 27 19:21:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7332: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 793 at Tue Nov 27 19:21:10 EST 2012
kill -USR1 793
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 793 killed at Tue Nov 27 19:21:11 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:21:11 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 870 >/dev/null 2>/dev/null
selfserv with PID 870 found at Tue Nov 27 19:21:11 EST 2012
selfserv with PID 870 started at Tue Nov 27 19:21:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7333: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 870 at Tue Nov 27 19:21:11 EST 2012
kill -USR1 870
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 870 killed at Tue Nov 27 19:21:11 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:21:11 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 977 >/dev/null 2>/dev/null
selfserv with PID 977 found at Tue Nov 27 19:21:11 EST 2012
selfserv with PID 977 started at Tue Nov 27 19:21:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7334: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 977 at Tue Nov 27 19:21:11 EST 2012
kill -USR1 977
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 977 killed at Tue Nov 27 19:21:11 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:21:11 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1035 >/dev/null 2>/dev/null
selfserv with PID 1035 found at Tue Nov 27 19:21:11 EST 2012
selfserv with PID 1035 started at Tue Nov 27 19:21:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7335: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1035 at Tue Nov 27 19:21:12 EST 2012
kill -USR1 1035
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1035 killed at Tue Nov 27 19:21:12 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:21:12 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1093 >/dev/null 2>/dev/null
selfserv with PID 1093 found at Tue Nov 27 19:21:12 EST 2012
selfserv with PID 1093 started at Tue Nov 27 19:21:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7336: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1093 at Tue Nov 27 19:21:12 EST 2012
kill -USR1 1093
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1093 killed at Tue Nov 27 19:21:12 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:21:12 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1163 >/dev/null 2>/dev/null
selfserv with PID 1163 found at Tue Nov 27 19:21:12 EST 2012
selfserv with PID 1163 started at Tue Nov 27 19:21:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7337: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1163 at Tue Nov 27 19:21:13 EST 2012
kill -USR1 1163
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1163 killed at Tue Nov 27 19:21:13 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:21:13 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1221 >/dev/null 2>/dev/null
selfserv with PID 1221 found at Tue Nov 27 19:21:13 EST 2012
selfserv with PID 1221 started at Tue Nov 27 19:21:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7338: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1221 at Tue Nov 27 19:21:13 EST 2012
kill -USR1 1221
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1221 killed at Tue Nov 27 19:21:13 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:21:13 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1279 >/dev/null 2>/dev/null
selfserv with PID 1279 found at Tue Nov 27 19:21:13 EST 2012
selfserv with PID 1279 started at Tue Nov 27 19:21:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #7339: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1279 at Tue Nov 27 19:21:13 EST 2012
kill -USR1 1279
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1279 killed at Tue Nov 27 19:21:13 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:21:13 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1349 >/dev/null 2>/dev/null
selfserv with PID 1349 found at Tue Nov 27 19:21:13 EST 2012
selfserv with PID 1349 started at Tue Nov 27 19:21:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7340: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1349 at Tue Nov 27 19:21:14 EST 2012
kill -USR1 1349
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1349 killed at Tue Nov 27 19:21:14 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:21:14 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1407 >/dev/null 2>/dev/null
selfserv with PID 1407 found at Tue Nov 27 19:21:14 EST 2012
selfserv with PID 1407 started at Tue Nov 27 19:21:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #7341: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1407 at Tue Nov 27 19:21:14 EST 2012
kill -USR1 1407
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1407 killed at Tue Nov 27 19:21:14 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:21:14 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1465 >/dev/null 2>/dev/null
selfserv with PID 1465 found at Tue Nov 27 19:21:14 EST 2012
selfserv with PID 1465 started at Tue Nov 27 19:21:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #7342: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1465 at Tue Nov 27 19:21:15 EST 2012
kill -USR1 1465
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1465 killed at Tue Nov 27 19:21:15 EST 2012
ssl.sh: Cache CRL SSL Client Tests   - with ECC ===============================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/authin.tl.tmp
0
selfserv starting at Tue Nov 27 19:21:15 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:15 EST 2012
selfserv with PID 1530 started at Tue Nov 27 19:21:15 EST 2012
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:15 EST 2012
ssl.sh: #7343: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:15 EST 2012
ssl.sh: #7344: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:16 EST 2012
ssl.sh: #7345: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:16 EST 2012
ssl.sh: #7346: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:16 EST 2012
ssl.sh: #7347: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:16 EST 2012
ssl.sh: #7348: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:16 EST 2012
ssl.sh: #7349: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:16 EST 2012
ssl.sh: #7350: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:17 EST 2012
ssl.sh: #7351: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:17 EST 2012
ssl.sh: #7352: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:17 EST 2012
ssl.sh: #7353: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:17 EST 2012
ssl.sh: #7354: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:17 EST 2012
ssl.sh: #7355: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:18 EST 2012
================= CRL Reloaded =============
ssl.sh: #7356: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:18 EST 2012
ssl.sh: #7357: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:18 EST 2012
ssl.sh: #7358: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:18 EST 2012
ssl.sh: #7359: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:18 EST 2012
ssl.sh: #7360: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:18 EST 2012
ssl.sh: #7361: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:19 EST 2012
ssl.sh: #7362: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:19 EST 2012
ssl.sh: #7363: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:19 EST 2012
ssl.sh: #7364: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:19 EST 2012
ssl.sh: #7365: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:19 EST 2012
ssl.sh: #7366: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:20 EST 2012
ssl.sh: #7367: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:20 EST 2012
ssl.sh: #7368: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:20 EST 2012
ssl.sh: #7369: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:20 EST 2012
================= CRL Reloaded =============
ssl.sh: #7370: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:20 EST 2012
ssl.sh: #7371: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:21 EST 2012
ssl.sh: #7372: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:21 EST 2012
ssl.sh: #7373: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:21 EST 2012
ssl.sh: #7374: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:21 EST 2012
ssl.sh: #7375: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:21 EST 2012
ssl.sh: #7376: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:21 EST 2012
ssl.sh: #7377: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:22 EST 2012
ssl.sh: #7378: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:22 EST 2012
ssl.sh: #7379: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:22 EST 2012
ssl.sh: #7380: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:22 EST 2012
ssl.sh: #7381: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:22 EST 2012
ssl.sh: #7382: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 1530 >/dev/null 2>/dev/null
selfserv with PID 1530 found at Tue Nov 27 19:21:23 EST 2012
ssl.sh: #7383: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 1530 at Tue Nov 27 19:21:23 EST 2012
kill -USR1 1530
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1530 killed at Tue Nov 27 19:21:23 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:21:23 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:23 EST 2012
selfserv with PID 2994 started at Tue Nov 27 19:21:23 EST 2012
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:23 EST 2012
ssl.sh: #7384: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:23 EST 2012
ssl.sh: #7385: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:23 EST 2012
ssl.sh: #7386: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:24 EST 2012
ssl.sh: #7387: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:24 EST 2012
ssl.sh: #7388: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:24 EST 2012
ssl.sh: #7389: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:24 EST 2012
ssl.sh: #7390: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:24 EST 2012
ssl.sh: #7391: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:25 EST 2012
ssl.sh: #7392: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:25 EST 2012
ssl.sh: #7393: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:25 EST 2012
ssl.sh: #7394: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:25 EST 2012
ssl.sh: #7395: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:25 EST 2012
ssl.sh: #7396: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:25 EST 2012
================= CRL Reloaded =============
ssl.sh: #7397: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:26 EST 2012
ssl.sh: #7398: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:26 EST 2012
ssl.sh: #7399: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:26 EST 2012
ssl.sh: #7400: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:26 EST 2012
ssl.sh: #7401: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:26 EST 2012
ssl.sh: #7402: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:27 EST 2012
ssl.sh: #7403: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:27 EST 2012
ssl.sh: #7404: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:27 EST 2012
ssl.sh: #7405: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:27 EST 2012
ssl.sh: #7406: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:27 EST 2012
ssl.sh: #7407: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:28 EST 2012
ssl.sh: #7408: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:28 EST 2012
ssl.sh: #7409: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:28 EST 2012
ssl.sh: #7410: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:28 EST 2012
================= CRL Reloaded =============
ssl.sh: #7411: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:28 EST 2012
ssl.sh: #7412: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:29 EST 2012
ssl.sh: #7413: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:29 EST 2012
ssl.sh: #7414: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:29 EST 2012
ssl.sh: #7415: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:29 EST 2012
ssl.sh: #7416: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:29 EST 2012
ssl.sh: #7417: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:29 EST 2012
ssl.sh: #7418: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:30 EST 2012
ssl.sh: #7419: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:30 EST 2012
ssl.sh: #7420: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:30 EST 2012
ssl.sh: #7421: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:30 EST 2012
ssl.sh: #7422: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:30 EST 2012
ssl.sh: #7423: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 2994 >/dev/null 2>/dev/null
selfserv with PID 2994 found at Tue Nov 27 19:21:31 EST 2012
ssl.sh: #7424: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 2994 at Tue Nov 27 19:21:31 EST 2012
kill -USR1 2994
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2994 killed at Tue Nov 27 19:21:31 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:21:31 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:31 EST 2012
selfserv with PID 4456 started at Tue Nov 27 19:21:31 EST 2012
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:31 EST 2012
ssl.sh: #7425: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:31 EST 2012
ssl.sh: #7426: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:32 EST 2012
ssl.sh: #7427: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:32 EST 2012
ssl.sh: #7428: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:32 EST 2012
ssl.sh: #7429: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:32 EST 2012
ssl.sh: #7430: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:32 EST 2012
ssl.sh: #7431: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:33 EST 2012
ssl.sh: #7432: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:33 EST 2012
ssl.sh: #7433: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:33 EST 2012
ssl.sh: #7434: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:33 EST 2012
ssl.sh: #7435: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:34 EST 2012
ssl.sh: #7436: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:34 EST 2012
ssl.sh: #7437: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:34 EST 2012
================= CRL Reloaded =============
ssl.sh: #7438: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:34 EST 2012
ssl.sh: #7439: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:34 EST 2012
ssl.sh: #7440: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:35 EST 2012
ssl.sh: #7441: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:35 EST 2012
ssl.sh: #7442: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:35 EST 2012
ssl.sh: #7443: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:35 EST 2012
ssl.sh: #7444: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:35 EST 2012
ssl.sh: #7445: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:36 EST 2012
ssl.sh: #7446: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:36 EST 2012
ssl.sh: #7447: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:36 EST 2012
ssl.sh: #7448: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:36 EST 2012
ssl.sh: #7449: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:37 EST 2012
ssl.sh: #7450: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:37 EST 2012
ssl.sh: #7451: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:37 EST 2012
================= CRL Reloaded =============
ssl.sh: #7452: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:37 EST 2012
ssl.sh: #7453: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:37 EST 2012
ssl.sh: #7454: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:38 EST 2012
ssl.sh: #7455: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:38 EST 2012
ssl.sh: #7456: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:38 EST 2012
ssl.sh: #7457: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:38 EST 2012
ssl.sh: #7458: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:38 EST 2012
ssl.sh: #7459: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:39 EST 2012
ssl.sh: #7460: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:39 EST 2012
ssl.sh: #7461: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:39 EST 2012
ssl.sh: #7462: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:39 EST 2012
ssl.sh: #7463: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:40 EST 2012
ssl.sh: #7464: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 4456 >/dev/null 2>/dev/null
selfserv with PID 4456 found at Tue Nov 27 19:21:40 EST 2012
ssl.sh: #7465: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 4456 at Tue Nov 27 19:21:40 EST 2012
kill -USR1 4456
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4456 killed at Tue Nov 27 19:21:40 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:21:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:40 EST 2012
selfserv with PID 5920 started at Tue Nov 27 19:21:40 EST 2012
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:40 EST 2012
ssl.sh: #7466: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:40 EST 2012
ssl.sh: #7467: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:41 EST 2012
ssl.sh: #7468: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:41 EST 2012
ssl.sh: #7469: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:41 EST 2012
ssl.sh: #7470: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:41 EST 2012
ssl.sh: #7471: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:42 EST 2012
ssl.sh: #7472: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:42 EST 2012
ssl.sh: #7473: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:42 EST 2012
ssl.sh: #7474: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:42 EST 2012
ssl.sh: #7475: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:42 EST 2012
ssl.sh: #7476: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:43 EST 2012
ssl.sh: #7477: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:43 EST 2012
ssl.sh: #7478: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:43 EST 2012
================= CRL Reloaded =============
ssl.sh: #7479: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:43 EST 2012
ssl.sh: #7480: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:44 EST 2012
ssl.sh: #7481: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:44 EST 2012
ssl.sh: #7482: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:44 EST 2012
ssl.sh: #7483: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:44 EST 2012
ssl.sh: #7484: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:44 EST 2012
ssl.sh: #7485: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:45 EST 2012
ssl.sh: #7486: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:45 EST 2012
ssl.sh: #7487: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:45 EST 2012
ssl.sh: #7488: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:45 EST 2012
ssl.sh: #7489: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:45 EST 2012
ssl.sh: #7490: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:46 EST 2012
ssl.sh: #7491: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:46 EST 2012
ssl.sh: #7492: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:46 EST 2012
================= CRL Reloaded =============
ssl.sh: #7493: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:46 EST 2012
ssl.sh: #7494: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:47 EST 2012
ssl.sh: #7495: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:47 EST 2012
ssl.sh: #7496: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:47 EST 2012
ssl.sh: #7497: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:47 EST 2012
ssl.sh: #7498: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:47 EST 2012
ssl.sh: #7499: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:48 EST 2012
ssl.sh: #7500: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:48 EST 2012
ssl.sh: #7501: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:48 EST 2012
ssl.sh: #7502: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:48 EST 2012
ssl.sh: #7503: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:49 EST 2012
ssl.sh: #7504: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:49 EST 2012
ssl.sh: #7505: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 5920 >/dev/null 2>/dev/null
selfserv with PID 5920 found at Tue Nov 27 19:21:49 EST 2012
ssl.sh: #7506: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 5920 at Tue Nov 27 19:21:49 EST 2012
kill -USR1 5920
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5920 killed at Tue Nov 27 19:21:49 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:21:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 7383 >/dev/null 2>/dev/null
selfserv with PID 7383 found at Tue Nov 27 19:21:49 EST 2012
selfserv with PID 7383 started at Tue Nov 27 19:21:49 EST 2012
trying to kill selfserv with PID 7383 at Tue Nov 27 19:21:49 EST 2012
kill -USR1 7383
./ssl.sh: line 173:  7383 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 7383 killed at Tue Nov 27 19:21:49 EST 2012
selfserv starting at Tue Nov 27 19:21:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:49 EST 2012
selfserv with PID 7417 started at Tue Nov 27 19:21:49 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:49 EST 2012
ssl.sh: #7507: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:50 EST 2012
ssl.sh: #7508: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:50 EST 2012
ssl.sh: #7509: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:50 EST 2012
ssl.sh: #7510: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:50 EST 2012
ssl.sh: #7511: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:50 EST 2012
ssl.sh: #7512: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:51 EST 2012
ssl.sh: #7513: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:51 EST 2012
ssl.sh: #7514: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:51 EST 2012
ssl.sh: #7515: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:51 EST 2012
ssl.sh: #7516: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:51 EST 2012
ssl.sh: #7517: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:52 EST 2012
ssl.sh: #7518: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:52 EST 2012
ssl.sh: #7519: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:52 EST 2012
================= CRL Reloaded =============
ssl.sh: #7520: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:52 EST 2012
ssl.sh: #7521: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:52 EST 2012
ssl.sh: #7522: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:53 EST 2012
ssl.sh: #7523: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:53 EST 2012
ssl.sh: #7524: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:53 EST 2012
ssl.sh: #7525: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:53 EST 2012
ssl.sh: #7526: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:53 EST 2012
ssl.sh: #7527: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:54 EST 2012
ssl.sh: #7528: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:54 EST 2012
ssl.sh: #7529: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:54 EST 2012
ssl.sh: #7530: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:54 EST 2012
ssl.sh: #7531: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:54 EST 2012
ssl.sh: #7532: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:55 EST 2012
ssl.sh: #7533: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:55 EST 2012
================= CRL Reloaded =============
ssl.sh: #7534: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:55 EST 2012
ssl.sh: #7535: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:55 EST 2012
ssl.sh: #7536: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:55 EST 2012
ssl.sh: #7537: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:56 EST 2012
ssl.sh: #7538: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:56 EST 2012
ssl.sh: #7539: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:56 EST 2012
ssl.sh: #7540: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:56 EST 2012
ssl.sh: #7541: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:56 EST 2012
ssl.sh: #7542: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:57 EST 2012
ssl.sh: #7543: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:57 EST 2012
ssl.sh: #7544: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:57 EST 2012
ssl.sh: #7545: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:57 EST 2012
ssl.sh: #7546: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7417 >/dev/null 2>/dev/null
selfserv with PID 7417 found at Tue Nov 27 19:21:57 EST 2012
ssl.sh: #7547: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 7417 at Tue Nov 27 19:21:57 EST 2012
kill -USR1 7417
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 7417 killed at Tue Nov 27 19:21:57 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:21:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:21:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:21:57 EST 2012
selfserv with PID 8879 started at Tue Nov 27 19:21:57 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:21:58 EST 2012
ssl.sh: #7548: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:21:58 EST 2012
ssl.sh: #7549: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:21:58 EST 2012
ssl.sh: #7550: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:21:58 EST 2012
ssl.sh: #7551: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:21:59 EST 2012
ssl.sh: #7552: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:21:59 EST 2012
ssl.sh: #7553: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:21:59 EST 2012
ssl.sh: #7554: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:21:59 EST 2012
ssl.sh: #7555: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:21:59 EST 2012
ssl.sh: #7556: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:21:59 EST 2012
ssl.sh: #7557: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:00 EST 2012
ssl.sh: #7558: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:00 EST 2012
ssl.sh: #7559: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:00 EST 2012
ssl.sh: #7560: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:00 EST 2012
================= CRL Reloaded =============
ssl.sh: #7561: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:00 EST 2012
ssl.sh: #7562: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:01 EST 2012
ssl.sh: #7563: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:01 EST 2012
ssl.sh: #7564: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:01 EST 2012
ssl.sh: #7565: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:01 EST 2012
ssl.sh: #7566: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:01 EST 2012
ssl.sh: #7567: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:02 EST 2012
ssl.sh: #7568: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:02 EST 2012
ssl.sh: #7569: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:02 EST 2012
ssl.sh: #7570: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:02 EST 2012
ssl.sh: #7571: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:02 EST 2012
ssl.sh: #7572: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:03 EST 2012
ssl.sh: #7573: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:03 EST 2012
ssl.sh: #7574: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:03 EST 2012
================= CRL Reloaded =============
ssl.sh: #7575: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:03 EST 2012
ssl.sh: #7576: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:03 EST 2012
ssl.sh: #7577: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:03 EST 2012
ssl.sh: #7578: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:04 EST 2012
ssl.sh: #7579: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:04 EST 2012
ssl.sh: #7580: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:04 EST 2012
ssl.sh: #7581: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:04 EST 2012
ssl.sh: #7582: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:04 EST 2012
ssl.sh: #7583: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:05 EST 2012
ssl.sh: #7584: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:05 EST 2012
ssl.sh: #7585: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:05 EST 2012
ssl.sh: #7586: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:05 EST 2012
ssl.sh: #7587: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8879 >/dev/null 2>/dev/null
selfserv with PID 8879 found at Tue Nov 27 19:22:05 EST 2012
ssl.sh: #7588: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8879 at Tue Nov 27 19:22:05 EST 2012
kill -USR1 8879
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8879 killed at Tue Nov 27 19:22:05 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:22:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:22:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:05 EST 2012
selfserv with PID 10353 started at Tue Nov 27 19:22:05 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:06 EST 2012
ssl.sh: #7589: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:06 EST 2012
ssl.sh: #7590: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:06 EST 2012
ssl.sh: #7591: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:06 EST 2012
ssl.sh: #7592: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:07 EST 2012
ssl.sh: #7593: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:07 EST 2012
ssl.sh: #7594: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:07 EST 2012
ssl.sh: #7595: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:07 EST 2012
ssl.sh: #7596: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:07 EST 2012
ssl.sh: #7597: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:08 EST 2012
ssl.sh: #7598: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:08 EST 2012
ssl.sh: #7599: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:08 EST 2012
ssl.sh: #7600: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:08 EST 2012
ssl.sh: #7601: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:08 EST 2012
================= CRL Reloaded =============
ssl.sh: #7602: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:08 EST 2012
ssl.sh: #7603: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:09 EST 2012
ssl.sh: #7604: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:09 EST 2012
ssl.sh: #7605: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:09 EST 2012
ssl.sh: #7606: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:09 EST 2012
ssl.sh: #7607: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:09 EST 2012
ssl.sh: #7608: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:10 EST 2012
ssl.sh: #7609: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:10 EST 2012
ssl.sh: #7610: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:10 EST 2012
ssl.sh: #7611: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:10 EST 2012
ssl.sh: #7612: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:10 EST 2012
ssl.sh: #7613: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:11 EST 2012
ssl.sh: #7614: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:11 EST 2012
ssl.sh: #7615: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:11 EST 2012
================= CRL Reloaded =============
ssl.sh: #7616: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:11 EST 2012
ssl.sh: #7617: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:12 EST 2012
ssl.sh: #7618: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:12 EST 2012
ssl.sh: #7619: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:12 EST 2012
ssl.sh: #7620: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:12 EST 2012
ssl.sh: #7621: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:12 EST 2012
ssl.sh: #7622: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:13 EST 2012
ssl.sh: #7623: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:13 EST 2012
ssl.sh: #7624: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:13 EST 2012
ssl.sh: #7625: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:13 EST 2012
ssl.sh: #7626: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:13 EST 2012
ssl.sh: #7627: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:13 EST 2012
ssl.sh: #7628: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Tue Nov 27 19:22:14 EST 2012
ssl.sh: #7629: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10353 at Tue Nov 27 19:22:14 EST 2012
kill -USR1 10353
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10353 killed at Tue Nov 27 19:22:14 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:22:14 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:22:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:14 EST 2012
selfserv with PID 11821 started at Tue Nov 27 19:22:14 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:14 EST 2012
ssl.sh: #7630: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:14 EST 2012
ssl.sh: #7631: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:15 EST 2012
ssl.sh: #7632: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:15 EST 2012
ssl.sh: #7633: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:15 EST 2012
ssl.sh: #7634: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:15 EST 2012
ssl.sh: #7635: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:15 EST 2012
ssl.sh: #7636: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:16 EST 2012
ssl.sh: #7637: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:16 EST 2012
ssl.sh: #7638: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:16 EST 2012
ssl.sh: #7639: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:16 EST 2012
ssl.sh: #7640: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:17 EST 2012
ssl.sh: #7641: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:17 EST 2012
ssl.sh: #7642: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:17 EST 2012
================= CRL Reloaded =============
ssl.sh: #7643: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:17 EST 2012
ssl.sh: #7644: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:18 EST 2012
ssl.sh: #7645: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:18 EST 2012
ssl.sh: #7646: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:18 EST 2012
ssl.sh: #7647: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:18 EST 2012
ssl.sh: #7648: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:18 EST 2012
ssl.sh: #7649: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:19 EST 2012
ssl.sh: #7650: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:19 EST 2012
ssl.sh: #7651: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:19 EST 2012
ssl.sh: #7652: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:19 EST 2012
ssl.sh: #7653: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:19 EST 2012
ssl.sh: #7654: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:20 EST 2012
ssl.sh: #7655: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:20 EST 2012
ssl.sh: #7656: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:20 EST 2012
================= CRL Reloaded =============
ssl.sh: #7657: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:20 EST 2012
ssl.sh: #7658: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:21 EST 2012
ssl.sh: #7659: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:21 EST 2012
ssl.sh: #7660: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:21 EST 2012
ssl.sh: #7661: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:21 EST 2012
ssl.sh: #7662: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:22 EST 2012
ssl.sh: #7663: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:22 EST 2012
ssl.sh: #7664: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:22 EST 2012
ssl.sh: #7665: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:22 EST 2012
ssl.sh: #7666: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:22 EST 2012
ssl.sh: #7667: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:23 EST 2012
ssl.sh: #7668: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:23 EST 2012
ssl.sh: #7669: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11821 >/dev/null 2>/dev/null
selfserv with PID 11821 found at Tue Nov 27 19:22:23 EST 2012
ssl.sh: #7670: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11821 at Tue Nov 27 19:22:23 EST 2012
kill -USR1 11821
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11821 killed at Tue Nov 27 19:22:23 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:22:23 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:22:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:23 EST 2012
selfserv with PID 13288 started at Tue Nov 27 19:22:23 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:24 EST 2012
ssl.sh: #7671: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:24 EST 2012
ssl.sh: #7672: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:24 EST 2012
ssl.sh: #7673: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:24 EST 2012
ssl.sh: #7674: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:24 EST 2012
ssl.sh: #7675: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:25 EST 2012
ssl.sh: #7676: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:25 EST 2012
ssl.sh: #7677: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:25 EST 2012
ssl.sh: #7678: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:25 EST 2012
ssl.sh: #7679: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:25 EST 2012
ssl.sh: #7680: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:26 EST 2012
ssl.sh: #7681: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:26 EST 2012
ssl.sh: #7682: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:26 EST 2012
ssl.sh: #7683: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:26 EST 2012
================= CRL Reloaded =============
ssl.sh: #7684: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:27 EST 2012
ssl.sh: #7685: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:27 EST 2012
ssl.sh: #7686: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:27 EST 2012
ssl.sh: #7687: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:27 EST 2012
ssl.sh: #7688: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:27 EST 2012
ssl.sh: #7689: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:28 EST 2012
ssl.sh: #7690: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:28 EST 2012
ssl.sh: #7691: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:28 EST 2012
ssl.sh: #7692: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:28 EST 2012
ssl.sh: #7693: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:28 EST 2012
ssl.sh: #7694: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:29 EST 2012
ssl.sh: #7695: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:29 EST 2012
ssl.sh: #7696: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:29 EST 2012
ssl.sh: #7697: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:29 EST 2012
================= CRL Reloaded =============
ssl.sh: #7698: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:30 EST 2012
ssl.sh: #7699: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:30 EST 2012
ssl.sh: #7700: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:30 EST 2012
ssl.sh: #7701: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:30 EST 2012
ssl.sh: #7702: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:30 EST 2012
ssl.sh: #7703: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:31 EST 2012
ssl.sh: #7704: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:31 EST 2012
ssl.sh: #7705: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:31 EST 2012
ssl.sh: #7706: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: PR_Poll returned 0x09 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:31 EST 2012
ssl.sh: #7707: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:32 EST 2012
ssl.sh: #7708: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:32 EST 2012
ssl.sh: #7709: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:32 EST 2012
ssl.sh: #7710: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13288 >/dev/null 2>/dev/null
selfserv with PID 13288 found at Tue Nov 27 19:22:32 EST 2012
ssl.sh: #7711: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13288 at Tue Nov 27 19:22:32 EST 2012
kill -USR1 13288
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13288 killed at Tue Nov 27 19:22:32 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:22:32 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:22:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:32 EST 2012
selfserv with PID 14751 started at Tue Nov 27 19:22:32 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:33 EST 2012
ssl.sh: #7712: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:33 EST 2012
ssl.sh: #7713: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:33 EST 2012
ssl.sh: #7714: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:33 EST 2012
ssl.sh: #7715: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:34 EST 2012
ssl.sh: #7716: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:34 EST 2012
ssl.sh: #7717: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:34 EST 2012
ssl.sh: #7718: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:34 EST 2012
ssl.sh: #7719: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:34 EST 2012
ssl.sh: #7720: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:35 EST 2012
ssl.sh: #7721: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:35 EST 2012
ssl.sh: #7722: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:35 EST 2012
ssl.sh: #7723: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:35 EST 2012
ssl.sh: #7724: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:36 EST 2012
================= CRL Reloaded =============
ssl.sh: #7725: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:36 EST 2012
ssl.sh: #7726: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:36 EST 2012
ssl.sh: #7727: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:36 EST 2012
ssl.sh: #7728: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:37 EST 2012
ssl.sh: #7729: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:37 EST 2012
ssl.sh: #7730: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:37 EST 2012
ssl.sh: #7731: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:37 EST 2012
ssl.sh: #7732: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:37 EST 2012
ssl.sh: #7733: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:38 EST 2012
ssl.sh: #7734: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:38 EST 2012
ssl.sh: #7735: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:38 EST 2012
ssl.sh: #7736: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:38 EST 2012
ssl.sh: #7737: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:39 EST 2012
ssl.sh: #7738: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:39 EST 2012
================= CRL Reloaded =============
ssl.sh: #7739: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:39 EST 2012
ssl.sh: #7740: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:39 EST 2012
ssl.sh: #7741: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:39 EST 2012
ssl.sh: #7742: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:40 EST 2012
ssl.sh: #7743: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:40 EST 2012
ssl.sh: #7744: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:40 EST 2012
ssl.sh: #7745: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:40 EST 2012
ssl.sh: #7746: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:40 EST 2012
ssl.sh: #7747: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:41 EST 2012
ssl.sh: #7748: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:41 EST 2012
ssl.sh: #7749: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:41 EST 2012
ssl.sh: #7750: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:41 EST 2012
ssl.sh: #7751: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 14751 >/dev/null 2>/dev/null
selfserv with PID 14751 found at Tue Nov 27 19:22:42 EST 2012
ssl.sh: #7752: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 14751 at Tue Nov 27 19:22:42 EST 2012
kill -USR1 14751
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14751 killed at Tue Nov 27 19:22:42 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:22:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:22:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16213 >/dev/null 2>/dev/null
selfserv with PID 16213 found at Tue Nov 27 19:22:42 EST 2012
selfserv with PID 16213 started at Tue Nov 27 19:22:42 EST 2012
trying to kill selfserv with PID 16213 at Tue Nov 27 19:22:42 EST 2012
kill -USR1 16213
./ssl.sh: line 173: 16213 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16213 killed at Tue Nov 27 19:22:42 EST 2012
selfserv starting at Tue Nov 27 19:22:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:22:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:42 EST 2012
selfserv with PID 16247 started at Tue Nov 27 19:22:42 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:42 EST 2012
ssl.sh: #7753: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:42 EST 2012
ssl.sh: #7754: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:42 EST 2012
ssl.sh: #7755: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:43 EST 2012
ssl.sh: #7756: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:43 EST 2012
ssl.sh: #7757: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:43 EST 2012
ssl.sh: #7758: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:43 EST 2012
ssl.sh: #7759: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:43 EST 2012
ssl.sh: #7760: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:44 EST 2012
ssl.sh: #7761: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:44 EST 2012
ssl.sh: #7762: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:44 EST 2012
ssl.sh: #7763: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:44 EST 2012
ssl.sh: #7764: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:44 EST 2012
ssl.sh: #7765: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:45 EST 2012
================= CRL Reloaded =============
ssl.sh: #7766: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:45 EST 2012
ssl.sh: #7767: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:45 EST 2012
ssl.sh: #7768: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:45 EST 2012
ssl.sh: #7769: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:45 EST 2012
ssl.sh: #7770: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:46 EST 2012
ssl.sh: #7771: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:46 EST 2012
ssl.sh: #7772: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:46 EST 2012
ssl.sh: #7773: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:46 EST 2012
ssl.sh: #7774: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:46 EST 2012
ssl.sh: #7775: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:47 EST 2012
ssl.sh: #7776: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:47 EST 2012
ssl.sh: #7777: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:47 EST 2012
ssl.sh: #7778: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:47 EST 2012
ssl.sh: #7779: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:47 EST 2012
================= CRL Reloaded =============
ssl.sh: #7780: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:48 EST 2012
ssl.sh: #7781: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:48 EST 2012
ssl.sh: #7782: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:48 EST 2012
ssl.sh: #7783: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:48 EST 2012
ssl.sh: #7784: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:48 EST 2012
ssl.sh: #7785: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:48 EST 2012
ssl.sh: #7786: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:49 EST 2012
ssl.sh: #7787: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:49 EST 2012
ssl.sh: #7788: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:49 EST 2012
ssl.sh: #7789: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:49 EST 2012
ssl.sh: #7790: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:49 EST 2012
ssl.sh: #7791: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:50 EST 2012
ssl.sh: #7792: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 16247 >/dev/null 2>/dev/null
selfserv with PID 16247 found at Tue Nov 27 19:22:50 EST 2012
ssl.sh: #7793: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16247 at Tue Nov 27 19:22:50 EST 2012
kill -USR1 16247
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16247 killed at Tue Nov 27 19:22:50 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:22:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:22:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:50 EST 2012
selfserv with PID 17711 started at Tue Nov 27 19:22:50 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:50 EST 2012
ssl.sh: #7794: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:50 EST 2012
ssl.sh: #7795: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:51 EST 2012
ssl.sh: #7796: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:51 EST 2012
ssl.sh: #7797: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:51 EST 2012
ssl.sh: #7798: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:51 EST 2012
ssl.sh: #7799: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:52 EST 2012
ssl.sh: #7800: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:52 EST 2012
ssl.sh: #7801: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:52 EST 2012
ssl.sh: #7802: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:52 EST 2012
ssl.sh: #7803: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:52 EST 2012
ssl.sh: #7804: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:53 EST 2012
ssl.sh: #7805: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:53 EST 2012
ssl.sh: #7806: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:53 EST 2012
================= CRL Reloaded =============
ssl.sh: #7807: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:53 EST 2012
ssl.sh: #7808: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:53 EST 2012
ssl.sh: #7809: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:53 EST 2012
ssl.sh: #7810: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:54 EST 2012
ssl.sh: #7811: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:54 EST 2012
ssl.sh: #7812: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:54 EST 2012
ssl.sh: #7813: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:54 EST 2012
ssl.sh: #7814: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:54 EST 2012
ssl.sh: #7815: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:55 EST 2012
ssl.sh: #7816: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:55 EST 2012
ssl.sh: #7817: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:55 EST 2012
ssl.sh: #7818: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:55 EST 2012
ssl.sh: #7819: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:55 EST 2012
ssl.sh: #7820: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:56 EST 2012
================= CRL Reloaded =============
ssl.sh: #7821: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:56 EST 2012
ssl.sh: #7822: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:56 EST 2012
ssl.sh: #7823: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:56 EST 2012
ssl.sh: #7824: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:57 EST 2012
ssl.sh: #7825: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:57 EST 2012
ssl.sh: #7826: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:57 EST 2012
ssl.sh: #7827: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:57 EST 2012
ssl.sh: #7828: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:57 EST 2012
ssl.sh: #7829: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:58 EST 2012
ssl.sh: #7830: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:58 EST 2012
ssl.sh: #7831: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:58 EST 2012
ssl.sh: #7832: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:58 EST 2012
ssl.sh: #7833: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 17711 >/dev/null 2>/dev/null
selfserv with PID 17711 found at Tue Nov 27 19:22:58 EST 2012
ssl.sh: #7834: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17711 at Tue Nov 27 19:22:58 EST 2012
kill -USR1 17711
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17711 killed at Tue Nov 27 19:22:58 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:22:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:22:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:22:58 EST 2012
selfserv with PID 19174 started at Tue Nov 27 19:22:58 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:22:59 EST 2012
ssl.sh: #7835: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:22:59 EST 2012
ssl.sh: #7836: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:22:59 EST 2012
ssl.sh: #7837: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:22:59 EST 2012
ssl.sh: #7838: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:00 EST 2012
ssl.sh: #7839: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:00 EST 2012
ssl.sh: #7840: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:00 EST 2012
ssl.sh: #7841: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:00 EST 2012
ssl.sh: #7842: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:00 EST 2012
ssl.sh: #7843: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:00 EST 2012
ssl.sh: #7844: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:01 EST 2012
ssl.sh: #7845: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:01 EST 2012
ssl.sh: #7846: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:01 EST 2012
ssl.sh: #7847: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:01 EST 2012
================= CRL Reloaded =============
ssl.sh: #7848: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:02 EST 2012
ssl.sh: #7849: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:02 EST 2012
ssl.sh: #7850: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:02 EST 2012
ssl.sh: #7851: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:02 EST 2012
ssl.sh: #7852: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:02 EST 2012
ssl.sh: #7853: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:02 EST 2012
ssl.sh: #7854: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:03 EST 2012
ssl.sh: #7855: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:03 EST 2012
ssl.sh: #7856: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:03 EST 2012
ssl.sh: #7857: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:03 EST 2012
ssl.sh: #7858: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:03 EST 2012
ssl.sh: #7859: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:04 EST 2012
ssl.sh: #7860: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:04 EST 2012
ssl.sh: #7861: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 161 bytes
tstclnt: Writing 161 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:04 EST 2012
================= CRL Reloaded =============
ssl.sh: #7862: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:04 EST 2012
ssl.sh: #7863: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:04 EST 2012
ssl.sh: #7864: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:05 EST 2012
ssl.sh: #7865: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:05 EST 2012
ssl.sh: #7866: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:05 EST 2012
ssl.sh: #7867: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:05 EST 2012
ssl.sh: #7868: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:05 EST 2012
ssl.sh: #7869: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:05 EST 2012
ssl.sh: #7870: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:06 EST 2012
ssl.sh: #7871: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:06 EST 2012
ssl.sh: #7872: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:06 EST 2012
ssl.sh: #7873: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:06 EST 2012
ssl.sh: #7874: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 19174 >/dev/null 2>/dev/null
selfserv with PID 19174 found at Tue Nov 27 19:23:06 EST 2012
ssl.sh: #7875: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19174 at Tue Nov 27 19:23:06 EST 2012
kill -USR1 19174
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 19174 killed at Tue Nov 27 19:23:06 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:23:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:06 EST 2012
selfserv with PID 20637 started at Tue Nov 27 19:23:06 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:07 EST 2012
ssl.sh: #7876: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:07 EST 2012
ssl.sh: #7877: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:07 EST 2012
ssl.sh: #7878: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:08 EST 2012
ssl.sh: #7879: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:08 EST 2012
ssl.sh: #7880: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:08 EST 2012
ssl.sh: #7881: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:08 EST 2012
ssl.sh: #7882: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:09 EST 2012
ssl.sh: #7883: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:09 EST 2012
ssl.sh: #7884: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:09 EST 2012
ssl.sh: #7885: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:09 EST 2012
ssl.sh: #7886: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:09 EST 2012
ssl.sh: #7887: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:10 EST 2012
ssl.sh: #7888: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:10 EST 2012
================= CRL Reloaded =============
ssl.sh: #7889: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:10 EST 2012
ssl.sh: #7890: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:10 EST 2012
ssl.sh: #7891: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:11 EST 2012
ssl.sh: #7892: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:11 EST 2012
ssl.sh: #7893: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:11 EST 2012
ssl.sh: #7894: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:11 EST 2012
ssl.sh: #7895: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:11 EST 2012
ssl.sh: #7896: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:12 EST 2012
ssl.sh: #7897: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:12 EST 2012
ssl.sh: #7898: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:12 EST 2012
ssl.sh: #7899: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:12 EST 2012
ssl.sh: #7900: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:13 EST 2012
ssl.sh: #7901: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:13 EST 2012
ssl.sh: #7902: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:13 EST 2012
================= CRL Reloaded =============
ssl.sh: #7903: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:13 EST 2012
ssl.sh: #7904: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:14 EST 2012
ssl.sh: #7905: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:14 EST 2012
ssl.sh: #7906: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:14 EST 2012
ssl.sh: #7907: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:14 EST 2012
ssl.sh: #7908: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:14 EST 2012
ssl.sh: #7909: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:15 EST 2012
ssl.sh: #7910: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:15 EST 2012
ssl.sh: #7911: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:15 EST 2012
ssl.sh: #7912: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:15 EST 2012
ssl.sh: #7913: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:15 EST 2012
ssl.sh: #7914: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:16 EST 2012
ssl.sh: #7915: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 20637 >/dev/null 2>/dev/null
selfserv with PID 20637 found at Tue Nov 27 19:23:16 EST 2012
ssl.sh: #7916: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20637 at Tue Nov 27 19:23:16 EST 2012
kill -USR1 20637
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20637 killed at Tue Nov 27 19:23:16 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:23:16 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:16 EST 2012
selfserv with PID 22100 started at Tue Nov 27 19:23:16 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:16 EST 2012
ssl.sh: #7917: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:17 EST 2012
ssl.sh: #7918: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:17 EST 2012
ssl.sh: #7919: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:17 EST 2012
ssl.sh: #7920: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:17 EST 2012
ssl.sh: #7921: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:18 EST 2012
ssl.sh: #7922: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:18 EST 2012
ssl.sh: #7923: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:18 EST 2012
ssl.sh: #7924: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:18 EST 2012
ssl.sh: #7925: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:18 EST 2012
ssl.sh: #7926: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:19 EST 2012
ssl.sh: #7927: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:19 EST 2012
ssl.sh: #7928: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:19 EST 2012
ssl.sh: #7929: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:19 EST 2012
================= CRL Reloaded =============
ssl.sh: #7930: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:20 EST 2012
ssl.sh: #7931: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:20 EST 2012
ssl.sh: #7932: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:20 EST 2012
ssl.sh: #7933: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:20 EST 2012
ssl.sh: #7934: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:20 EST 2012
ssl.sh: #7935: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:21 EST 2012
ssl.sh: #7936: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:21 EST 2012
ssl.sh: #7937: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:21 EST 2012
ssl.sh: #7938: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:21 EST 2012
ssl.sh: #7939: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:21 EST 2012
ssl.sh: #7940: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:22 EST 2012
ssl.sh: #7941: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:22 EST 2012
ssl.sh: #7942: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:22 EST 2012
ssl.sh: #7943: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:22 EST 2012
================= CRL Reloaded =============
ssl.sh: #7944: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:23 EST 2012
ssl.sh: #7945: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:23 EST 2012
ssl.sh: #7946: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:23 EST 2012
ssl.sh: #7947: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:23 EST 2012
ssl.sh: #7948: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:23 EST 2012
ssl.sh: #7949: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:24 EST 2012
ssl.sh: #7950: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:24 EST 2012
ssl.sh: #7951: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:24 EST 2012
ssl.sh: #7952: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:24 EST 2012
ssl.sh: #7953: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:25 EST 2012
ssl.sh: #7954: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:25 EST 2012
ssl.sh: #7955: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:25 EST 2012
ssl.sh: #7956: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 22100 >/dev/null 2>/dev/null
selfserv with PID 22100 found at Tue Nov 27 19:23:25 EST 2012
ssl.sh: #7957: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22100 at Tue Nov 27 19:23:25 EST 2012
kill -USR1 22100
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 22100 killed at Tue Nov 27 19:23:25 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:23:25 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:25 EST 2012
selfserv with PID 23563 started at Tue Nov 27 19:23:25 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:26 EST 2012
ssl.sh: #7958: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:26 EST 2012
ssl.sh: #7959: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:26 EST 2012
ssl.sh: #7960: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:26 EST 2012
ssl.sh: #7961: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:27 EST 2012
ssl.sh: #7962: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:27 EST 2012
ssl.sh: #7963: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:27 EST 2012
ssl.sh: #7964: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:27 EST 2012
ssl.sh: #7965: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:28 EST 2012
ssl.sh: #7966: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:28 EST 2012
ssl.sh: #7967: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:28 EST 2012
ssl.sh: #7968: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:28 EST 2012
ssl.sh: #7969: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:28 EST 2012
ssl.sh: #7970: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:29 EST 2012
================= CRL Reloaded =============
ssl.sh: #7971: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:29 EST 2012
ssl.sh: #7972: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:29 EST 2012
ssl.sh: #7973: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:29 EST 2012
ssl.sh: #7974: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:30 EST 2012
ssl.sh: #7975: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:30 EST 2012
ssl.sh: #7976: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:30 EST 2012
ssl.sh: #7977: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:30 EST 2012
ssl.sh: #7978: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:30 EST 2012
ssl.sh: #7979: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:31 EST 2012
ssl.sh: #7980: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:31 EST 2012
ssl.sh: #7981: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:31 EST 2012
ssl.sh: #7982: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:31 EST 2012
ssl.sh: #7983: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:32 EST 2012
ssl.sh: #7984: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 164 bytes
tstclnt: Writing 164 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:32 EST 2012
================= CRL Reloaded =============
ssl.sh: #7985: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:32 EST 2012
ssl.sh: #7986: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:32 EST 2012
ssl.sh: #7987: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:32 EST 2012
ssl.sh: #7988: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:33 EST 2012
ssl.sh: #7989: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:33 EST 2012
ssl.sh: #7990: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:33 EST 2012
ssl.sh: #7991: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:33 EST 2012
ssl.sh: #7992: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:33 EST 2012
ssl.sh: #7993: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:34 EST 2012
ssl.sh: #7994: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:34 EST 2012
ssl.sh: #7995: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:34 EST 2012
ssl.sh: #7996: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:34 EST 2012
ssl.sh: #7997: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23563 >/dev/null 2>/dev/null
selfserv with PID 23563 found at Tue Nov 27 19:23:35 EST 2012
ssl.sh: #7998: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23563 at Tue Nov 27 19:23:35 EST 2012
kill -USR1 23563
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23563 killed at Tue Nov 27 19:23:35 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:23:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25026 >/dev/null 2>/dev/null
selfserv with PID 25026 found at Tue Nov 27 19:23:35 EST 2012
selfserv with PID 25026 started at Tue Nov 27 19:23:35 EST 2012
trying to kill selfserv with PID 25026 at Tue Nov 27 19:23:35 EST 2012
kill -USR1 25026
./ssl.sh: line 173: 25026 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25026 killed at Tue Nov 27 19:23:35 EST 2012
ssl.sh: SSL Stress Test  - server bypass/client bypass  - with ECC ===============================
ssl.sh: Stress SSL2 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:23:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25149 >/dev/null 2>/dev/null
selfserv with PID 25149 found at Tue Nov 27 19:23:35 EST 2012
selfserv with PID 25149 started at Tue Nov 27 19:23:35 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C A \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:35 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: SSL2 - 1 server certificates tested.
strsclnt completed at Tue Nov 27 19:23:35 EST 2012
ssl.sh: #7999: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25149 at Tue Nov 27 19:23:35 EST 2012
kill -USR1 25149
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25149 killed at Tue Nov 27 19:23:35 EST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:23:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25227 >/dev/null 2>/dev/null
selfserv with PID 25227 found at Tue Nov 27 19:23:35 EST 2012
selfserv with PID 25227 started at Tue Nov 27 19:23:35 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C c -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:35 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:23:36 EST 2012
ssl.sh: #8000: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25227 at Tue Nov 27 19:23:36 EST 2012
kill -USR1 25227
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25227 killed at Tue Nov 27 19:23:36 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:23:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25305 >/dev/null 2>/dev/null
selfserv with PID 25305 found at Tue Nov 27 19:23:36 EST 2012
selfserv with PID 25305 started at Tue Nov 27 19:23:36 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C c \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:36 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:23:36 EST 2012
ssl.sh: #8001: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25305 at Tue Nov 27 19:23:36 EST 2012
kill -USR1 25305
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25305 killed at Tue Nov 27 19:23:36 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 19:23:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25383 >/dev/null 2>/dev/null
selfserv with PID 25383 found at Tue Nov 27 19:23:36 EST 2012
selfserv with PID 25383 started at Tue Nov 27 19:23:36 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C c -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:36 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:23:37 EST 2012
ssl.sh: #8002: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25383 at Tue Nov 27 19:23:37 EST 2012
kill -USR1 25383
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25383 killed at Tue Nov 27 19:23:37 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 19:23:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25461 >/dev/null 2>/dev/null
selfserv with PID 25461 found at Tue Nov 27 19:23:37 EST 2012
selfserv with PID 25461 started at Tue Nov 27 19:23:37 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:37 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:23:38 EST 2012
ssl.sh: #8003: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25461 at Tue Nov 27 19:23:38 EST 2012
kill -USR1 25461
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25461 killed at Tue Nov 27 19:23:38 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 19:23:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25539 >/dev/null 2>/dev/null
selfserv with PID 25539 found at Tue Nov 27 19:23:38 EST 2012
selfserv with PID 25539 started at Tue Nov 27 19:23:38 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:38 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:23:38 EST 2012
ssl.sh: #8004: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25539 at Tue Nov 27 19:23:38 EST 2012
kill -USR1 25539
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25539 killed at Tue Nov 27 19:23:38 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 19:23:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25617 >/dev/null 2>/dev/null
selfserv with PID 25617 found at Tue Nov 27 19:23:38 EST 2012
selfserv with PID 25617 started at Tue Nov 27 19:23:38 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:38 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:23:39 EST 2012
ssl.sh: #8005: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25617 at Tue Nov 27 19:23:39 EST 2012
kill -USR1 25617
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25617 killed at Tue Nov 27 19:23:39 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 19:23:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25695 >/dev/null 2>/dev/null
selfserv with PID 25695 found at Tue Nov 27 19:23:39 EST 2012
selfserv with PID 25695 started at Tue Nov 27 19:23:39 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:39 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:23:39 EST 2012
ssl.sh: #8006: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25695 at Tue Nov 27 19:23:39 EST 2012
kill -USR1 25695
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25695 killed at Tue Nov 27 19:23:39 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Tue Nov 27 19:23:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25779 >/dev/null 2>/dev/null
selfserv with PID 25779 found at Tue Nov 27 19:23:40 EST 2012
selfserv with PID 25779 started at Tue Nov 27 19:23:40 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:40 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:23:40 EST 2012
ssl.sh: #8007: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25779 at Tue Nov 27 19:23:40 EST 2012
kill -USR1 25779
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25779 killed at Tue Nov 27 19:23:40 EST 2012
ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:23:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25878 >/dev/null 2>/dev/null
selfserv with PID 25878 found at Tue Nov 27 19:23:40 EST 2012
selfserv with PID 25878 started at Tue Nov 27 19:23:40 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:40 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: SSL2 - 100 server certificates tested.
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:23:41 EST 2012
ssl.sh: #8008: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25878 at Tue Nov 27 19:23:41 EST 2012
kill -USR1 25878
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25878 killed at Tue Nov 27 19:23:41 EST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:23:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 25955 >/dev/null 2>/dev/null
selfserv with PID 25955 found at Tue Nov 27 19:23:41 EST 2012
selfserv with PID 25955 started at Tue Nov 27 19:23:41 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:41 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:23:42 EST 2012
ssl.sh: #8009: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 25955 at Tue Nov 27 19:23:42 EST 2012
kill -USR1 25955
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 25955 killed at Tue Nov 27 19:23:42 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:23:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26032 >/dev/null 2>/dev/null
selfserv with PID 26032 found at Tue Nov 27 19:23:42 EST 2012
selfserv with PID 26032 started at Tue Nov 27 19:23:42 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:42 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:23:43 EST 2012
ssl.sh: #8010: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26032 at Tue Nov 27 19:23:43 EST 2012
kill -USR1 26032
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26032 killed at Tue Nov 27 19:23:43 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:23:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26109 >/dev/null 2>/dev/null
selfserv with PID 26109 found at Tue Nov 27 19:23:43 EST 2012
selfserv with PID 26109 started at Tue Nov 27 19:23:43 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:43 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:23:44 EST 2012
ssl.sh: #8011: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26109 at Tue Nov 27 19:23:44 EST 2012
kill -USR1 26109
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26109 killed at Tue Nov 27 19:23:44 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 19:23:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26187 >/dev/null 2>/dev/null
selfserv with PID 26187 found at Tue Nov 27 19:23:44 EST 2012
selfserv with PID 26187 started at Tue Nov 27 19:23:44 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:44 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:23:44 EST 2012
ssl.sh: #8012: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26187 at Tue Nov 27 19:23:44 EST 2012
kill -USR1 26187
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26187 killed at Tue Nov 27 19:23:44 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:23:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26265 >/dev/null 2>/dev/null
selfserv with PID 26265 found at Tue Nov 27 19:23:44 EST 2012
selfserv with PID 26265 started at Tue Nov 27 19:23:44 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:44 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:23:44 EST 2012
ssl.sh: #8013: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26265 at Tue Nov 27 19:23:45 EST 2012
kill -USR1 26265
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26265 killed at Tue Nov 27 19:23:45 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 19:23:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26343 >/dev/null 2>/dev/null
selfserv with PID 26343 found at Tue Nov 27 19:23:45 EST 2012
selfserv with PID 26343 started at Tue Nov 27 19:23:45 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:45 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:23:45 EST 2012
ssl.sh: #8014: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26343 at Tue Nov 27 19:23:45 EST 2012
kill -USR1 26343
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26343 killed at Tue Nov 27 19:23:45 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:23:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26421 >/dev/null 2>/dev/null
selfserv with PID 26421 found at Tue Nov 27 19:23:45 EST 2012
selfserv with PID 26421 started at Tue Nov 27 19:23:45 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:45 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:23:45 EST 2012
ssl.sh: #8015: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26421 at Tue Nov 27 19:23:45 EST 2012
kill -USR1 26421
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26421 killed at Tue Nov 27 19:23:45 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Tue Nov 27 19:23:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26505 >/dev/null 2>/dev/null
selfserv with PID 26505 found at Tue Nov 27 19:23:46 EST 2012
selfserv with PID 26505 started at Tue Nov 27 19:23:46 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:46 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:23:46 EST 2012
ssl.sh: #8016: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26505 at Tue Nov 27 19:23:46 EST 2012
kill -USR1 26505
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26505 killed at Tue Nov 27 19:23:46 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Tue Nov 27 19:23:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -k buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26589 >/dev/null 2>/dev/null
selfserv with PID 26589 found at Tue Nov 27 19:23:46 EST 2012
selfserv with PID 26589 started at Tue Nov 27 19:23:46 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a buildnss02-sni.usersys.redhat.com \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:46 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:23:47 EST 2012
ssl.sh: #8017: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26589 at Tue Nov 27 19:23:47 EST 2012
kill -USR1 26589
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26589 killed at Tue Nov 27 19:23:47 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:23:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26688 >/dev/null 2>/dev/null
selfserv with PID 26688 found at Tue Nov 27 19:23:47 EST 2012
selfserv with PID 26688 started at Tue Nov 27 19:23:47 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:47 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:23:48 EST 2012
ssl.sh: #8018: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26688 at Tue Nov 27 19:23:48 EST 2012
kill -USR1 26688
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26688 killed at Tue Nov 27 19:23:48 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:23:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26765 >/dev/null 2>/dev/null
selfserv with PID 26765 found at Tue Nov 27 19:23:48 EST 2012
selfserv with PID 26765 started at Tue Nov 27 19:23:48 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:48 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:23:49 EST 2012
ssl.sh: #8019: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26765 at Tue Nov 27 19:23:49 EST 2012
kill -USR1 26765
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26765 killed at Tue Nov 27 19:23:49 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:23:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26843 >/dev/null 2>/dev/null
selfserv with PID 26843 found at Tue Nov 27 19:23:49 EST 2012
selfserv with PID 26843 started at Tue Nov 27 19:23:49 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:49 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:23:50 EST 2012
ssl.sh: #8020: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26843 at Tue Nov 27 19:23:50 EST 2012
kill -USR1 26843
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26843 killed at Tue Nov 27 19:23:50 EST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:23:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26920 >/dev/null 2>/dev/null
selfserv with PID 26920 found at Tue Nov 27 19:23:50 EST 2012
selfserv with PID 26920 started at Tue Nov 27 19:23:50 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:50 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:23:51 EST 2012
ssl.sh: #8021: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26920 at Tue Nov 27 19:23:51 EST 2012
kill -USR1 26920
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26920 killed at Tue Nov 27 19:23:51 EST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:23:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26997 >/dev/null 2>/dev/null
selfserv with PID 26997 found at Tue Nov 27 19:23:51 EST 2012
selfserv with PID 26997 started at Tue Nov 27 19:23:51 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:51 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:23:52 EST 2012
ssl.sh: #8022: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 26997 at Tue Nov 27 19:23:52 EST 2012
kill -USR1 26997
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26997 killed at Tue Nov 27 19:23:52 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 19:23:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27075 >/dev/null 2>/dev/null
selfserv with PID 27075 found at Tue Nov 27 19:23:52 EST 2012
selfserv with PID 27075 started at Tue Nov 27 19:23:52 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:52 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:23:52 EST 2012
ssl.sh: #8023: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27075 at Tue Nov 27 19:23:52 EST 2012
kill -USR1 27075
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27075 killed at Tue Nov 27 19:23:52 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:23:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27174 >/dev/null 2>/dev/null
selfserv with PID 27174 found at Tue Nov 27 19:23:53 EST 2012
selfserv with PID 27174 started at Tue Nov 27 19:23:53 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:53 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:23:53 EST 2012
ssl.sh: #8024: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27174 at Tue Nov 27 19:23:53 EST 2012
kill -USR1 27174
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27174 killed at Tue Nov 27 19:23:53 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 19:23:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27252 >/dev/null 2>/dev/null
selfserv with PID 27252 found at Tue Nov 27 19:23:53 EST 2012
selfserv with PID 27252 started at Tue Nov 27 19:23:53 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:53 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:23:54 EST 2012
ssl.sh: #8025: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27252 at Tue Nov 27 19:23:54 EST 2012
kill -USR1 27252
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27252 killed at Tue Nov 27 19:23:54 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:23:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27330 >/dev/null 2>/dev/null
selfserv with PID 27330 found at Tue Nov 27 19:23:54 EST 2012
selfserv with PID 27330 started at Tue Nov 27 19:23:54 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 10 -C :C004 -N -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:23:54 EST 2012
ssl.sh: #8026: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27330 at Tue Nov 27 19:23:54 EST 2012
kill -USR1 27330
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27330 killed at Tue Nov 27 19:23:54 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:23:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27407 >/dev/null 2>/dev/null
selfserv with PID 27407 found at Tue Nov 27 19:23:54 EST 2012
selfserv with PID 27407 started at Tue Nov 27 19:23:54 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:23:55 EST 2012
ssl.sh: #8027: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27407 at Tue Nov 27 19:23:55 EST 2012
kill -USR1 27407
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27407 killed at Tue Nov 27 19:23:55 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 19:23:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27484 >/dev/null 2>/dev/null
selfserv with PID 27484 found at Tue Nov 27 19:23:55 EST 2012
selfserv with PID 27484 started at Tue Nov 27 19:23:55 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C :C013 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:55 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:23:55 EST 2012
ssl.sh: #8028: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27484 at Tue Nov 27 19:23:55 EST 2012
kill -USR1 27484
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27484 killed at Tue Nov 27 19:23:55 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:23:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27562 >/dev/null 2>/dev/null
selfserv with PID 27562 found at Tue Nov 27 19:23:55 EST 2012
selfserv with PID 27562 started at Tue Nov 27 19:23:55 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:55 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:23:56 EST 2012
ssl.sh: #8029: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27562 at Tue Nov 27 19:23:56 EST 2012
kill -USR1 27562
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27562 killed at Tue Nov 27 19:23:56 EST 2012
ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass  - with ECC ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:23:56 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27714 >/dev/null 2>/dev/null
selfserv with PID 27714 found at Tue Nov 27 19:23:56 EST 2012
selfserv with PID 27714 started at Tue Nov 27 19:23:56 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 1000 -C c -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:56 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:23:57 EST 2012
ssl.sh: #8030: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27714 at Tue Nov 27 19:23:57 EST 2012
kill -USR1 27714
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27714 killed at Tue Nov 27 19:23:57 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:23:57 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27792 >/dev/null 2>/dev/null
selfserv with PID 27792 found at Tue Nov 27 19:23:57 EST 2012
selfserv with PID 27792 started at Tue Nov 27 19:23:57 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 1000 -C c \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:57 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:23:57 EST 2012
ssl.sh: #8031: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27792 at Tue Nov 27 19:23:57 EST 2012
kill -USR1 27792
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27792 killed at Tue Nov 27 19:23:57 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 19:23:57 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27870 >/dev/null 2>/dev/null
selfserv with PID 27870 found at Tue Nov 27 19:23:57 EST 2012
selfserv with PID 27870 started at Tue Nov 27 19:23:57 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 1000 -C c -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:57 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:23:58 EST 2012
ssl.sh: #8032: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27870 at Tue Nov 27 19:23:58 EST 2012
kill -USR1 27870
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27870 killed at Tue Nov 27 19:23:58 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 19:23:58 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27948 >/dev/null 2>/dev/null
selfserv with PID 27948 found at Tue Nov 27 19:23:58 EST 2012
selfserv with PID 27948 started at Tue Nov 27 19:23:58 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:58 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:23:58 EST 2012
ssl.sh: #8033: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 27948 at Tue Nov 27 19:23:58 EST 2012
kill -USR1 27948
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27948 killed at Tue Nov 27 19:23:58 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 19:23:59 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28026 >/dev/null 2>/dev/null
selfserv with PID 28026 found at Tue Nov 27 19:23:59 EST 2012
selfserv with PID 28026 started at Tue Nov 27 19:23:59 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:59 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:23:59 EST 2012
ssl.sh: #8034: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28026 at Tue Nov 27 19:23:59 EST 2012
kill -USR1 28026
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28026 killed at Tue Nov 27 19:23:59 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 19:23:59 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:23:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28104 >/dev/null 2>/dev/null
selfserv with PID 28104 found at Tue Nov 27 19:23:59 EST 2012
selfserv with PID 28104 started at Tue Nov 27 19:23:59 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:23:59 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:24:00 EST 2012
ssl.sh: #8035: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28104 at Tue Nov 27 19:24:00 EST 2012
kill -USR1 28104
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28104 killed at Tue Nov 27 19:24:00 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 19:24:00 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:24:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28182 >/dev/null 2>/dev/null
selfserv with PID 28182 found at Tue Nov 27 19:24:00 EST 2012
selfserv with PID 28182 started at Tue Nov 27 19:24:00 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:24:00 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:24:01 EST 2012
ssl.sh: #8036: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28182 at Tue Nov 27 19:24:01 EST 2012
kill -USR1 28182
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28182 killed at Tue Nov 27 19:24:01 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:24:01 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:24:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28289 >/dev/null 2>/dev/null
selfserv with PID 28289 found at Tue Nov 27 19:24:01 EST 2012
selfserv with PID 28289 started at Tue Nov 27 19:24:01 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:24:01 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:24:02 EST 2012
ssl.sh: #8037: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28289 at Tue Nov 27 19:24:02 EST 2012
kill -USR1 28289
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28289 killed at Tue Nov 27 19:24:02 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:24:03 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:24:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28376 >/dev/null 2>/dev/null
selfserv with PID 28376 found at Tue Nov 27 19:24:03 EST 2012
selfserv with PID 28376 started at Tue Nov 27 19:24:03 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:24:03 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:24:04 EST 2012
ssl.sh: #8038: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28376 at Tue Nov 27 19:24:04 EST 2012
kill -USR1 28376
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28376 killed at Tue Nov 27 19:24:04 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:24:04 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:24:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28453 >/dev/null 2>/dev/null
selfserv with PID 28453 found at Tue Nov 27 19:24:04 EST 2012
selfserv with PID 28453 started at Tue Nov 27 19:24:04 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:24:04 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:24:05 EST 2012
ssl.sh: #8039: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28453 at Tue Nov 27 19:24:05 EST 2012
kill -USR1 28453
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28453 killed at Tue Nov 27 19:24:05 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 19:24:05 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:24:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28531 >/dev/null 2>/dev/null
selfserv with PID 28531 found at Tue Nov 27 19:24:05 EST 2012
selfserv with PID 28531 started at Tue Nov 27 19:24:05 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:24:05 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:24:05 EST 2012
ssl.sh: #8040: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28531 at Tue Nov 27 19:24:05 EST 2012
kill -USR1 28531
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28531 killed at Tue Nov 27 19:24:05 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:24:05 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:24:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28609 >/dev/null 2>/dev/null
selfserv with PID 28609 found at Tue Nov 27 19:24:05 EST 2012
selfserv with PID 28609 started at Tue Nov 27 19:24:05 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:24:05 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:24:06 EST 2012
ssl.sh: #8041: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28609 at Tue Nov 27 19:24:06 EST 2012
kill -USR1 28609
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28609 killed at Tue Nov 27 19:24:06 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 19:24:06 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:24:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28687 >/dev/null 2>/dev/null
selfserv with PID 28687 found at Tue Nov 27 19:24:06 EST 2012
selfserv with PID 28687 started at Tue Nov 27 19:24:06 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:24:06 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:24:06 EST 2012
ssl.sh: #8042: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28687 at Tue Nov 27 19:24:06 EST 2012
kill -USR1 28687
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28687 killed at Tue Nov 27 19:24:06 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:24:06 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:24:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28765 >/dev/null 2>/dev/null
selfserv with PID 28765 found at Tue Nov 27 19:24:06 EST 2012
selfserv with PID 28765 started at Tue Nov 27 19:24:06 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:24:06 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:24:07 EST 2012
ssl.sh: #8043: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28765 at Tue Nov 27 19:24:07 EST 2012
kill -USR1 28765
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28765 killed at Tue Nov 27 19:24:07 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:24:07 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:24:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28873 >/dev/null 2>/dev/null
selfserv with PID 28873 found at Tue Nov 27 19:24:07 EST 2012
selfserv with PID 28873 started at Tue Nov 27 19:24:07 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:24:07 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:24:08 EST 2012
ssl.sh: #8044: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28873 at Tue Nov 27 19:24:08 EST 2012
kill -USR1 28873
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28873 killed at Tue Nov 27 19:24:08 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:24:08 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:24:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 28950 >/dev/null 2>/dev/null
selfserv with PID 28950 found at Tue Nov 27 19:24:08 EST 2012
selfserv with PID 28950 started at Tue Nov 27 19:24:08 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:24:08 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:24:09 EST 2012
ssl.sh: #8045: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 28950 at Tue Nov 27 19:24:09 EST 2012
kill -USR1 28950
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 28950 killed at Tue Nov 27 19:24:09 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:24:09 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:24:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29028 >/dev/null 2>/dev/null
selfserv with PID 29028 found at Tue Nov 27 19:24:09 EST 2012
selfserv with PID 29028 started at Tue Nov 27 19:24:09 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:24:09 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:24:10 EST 2012
ssl.sh: #8046: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29028 at Tue Nov 27 19:24:10 EST 2012
kill -USR1 29028
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29028 killed at Tue Nov 27 19:24:10 EST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:24:10 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:24:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29105 >/dev/null 2>/dev/null
selfserv with PID 29105 found at Tue Nov 27 19:24:10 EST 2012
selfserv with PID 29105 started at Tue Nov 27 19:24:10 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:24:10 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:24:11 EST 2012
ssl.sh: #8047: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29105 at Tue Nov 27 19:24:11 EST 2012
kill -USR1 29105
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29105 killed at Tue Nov 27 19:24:11 EST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:24:11 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:24:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29182 >/dev/null 2>/dev/null
selfserv with PID 29182 found at Tue Nov 27 19:24:11 EST 2012
selfserv with PID 29182 started at Tue Nov 27 19:24:11 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:24:11 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:24:12 EST 2012
ssl.sh: #8048: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29182 at Tue Nov 27 19:24:12 EST 2012
kill -USR1 29182
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29182 killed at Tue Nov 27 19:24:12 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 19:24:12 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:24:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29260 >/dev/null 2>/dev/null
selfserv with PID 29260 found at Tue Nov 27 19:24:12 EST 2012
selfserv with PID 29260 started at Tue Nov 27 19:24:12 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:24:12 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:24:13 EST 2012
ssl.sh: #8049: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29260 at Tue Nov 27 19:24:13 EST 2012
kill -USR1 29260
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29260 killed at Tue Nov 27 19:24:13 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:24:13 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:24:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29359 >/dev/null 2>/dev/null
selfserv with PID 29359 found at Tue Nov 27 19:24:13 EST 2012
selfserv with PID 29359 started at Tue Nov 27 19:24:13 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:24:13 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:24:14 EST 2012
ssl.sh: #8050: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29359 at Tue Nov 27 19:24:14 EST 2012
kill -USR1 29359
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29359 killed at Tue Nov 27 19:24:14 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 19:24:14 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:24:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29436 >/dev/null 2>/dev/null
selfserv with PID 29436 found at Tue Nov 27 19:24:14 EST 2012
selfserv with PID 29436 started at Tue Nov 27 19:24:14 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:24:14 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:24:14 EST 2012
ssl.sh: #8051: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29436 at Tue Nov 27 19:24:14 EST 2012
kill -USR1 29436
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29436 killed at Tue Nov 27 19:24:14 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:24:14 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:24:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29514 >/dev/null 2>/dev/null
selfserv with PID 29514 found at Tue Nov 27 19:24:14 EST 2012
selfserv with PID 29514 started at Tue Nov 27 19:24:14 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:24:14 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:24:15 EST 2012
ssl.sh: #8052: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29514 at Tue Nov 27 19:24:15 EST 2012
kill -USR1 29514
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29514 killed at Tue Nov 27 19:24:15 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:24:15 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:24:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29591 >/dev/null 2>/dev/null
selfserv with PID 29591 found at Tue Nov 27 19:24:15 EST 2012
selfserv with PID 29591 started at Tue Nov 27 19:24:15 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:24:15 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:24:16 EST 2012
ssl.sh: #8053: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29591 at Tue Nov 27 19:24:16 EST 2012
kill -USR1 29591
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29591 killed at Tue Nov 27 19:24:16 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 19:24:16 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:24:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29668 >/dev/null 2>/dev/null
selfserv with PID 29668 found at Tue Nov 27 19:24:16 EST 2012
selfserv with PID 29668 started at Tue Nov 27 19:24:16 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:24:16 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:24:16 EST 2012
ssl.sh: #8054: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29668 at Tue Nov 27 19:24:16 EST 2012
kill -USR1 29668
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29668 killed at Tue Nov 27 19:24:16 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:24:16 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:24:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29746 >/dev/null 2>/dev/null
selfserv with PID 29746 found at Tue Nov 27 19:24:16 EST 2012
selfserv with PID 29746 started at Tue Nov 27 19:24:16 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:24:16 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:24:17 EST 2012
ssl.sh: #8055: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 29746 at Tue Nov 27 19:24:17 EST 2012
kill -USR1 29746
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29746 killed at Tue Nov 27 19:24:17 EST 2012
TIMESTAMP ssl END: Tue Nov 27 19:24:17 EST 2012
Running tests for merge
TIMESTAMP merge BEGIN: Tue Nov 27 19:24:17 EST 2012
merge.sh: Merge Tests ===============================
merge.sh: Creating an SDR key & Encrypt
sdrtest -d . -o /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/tests.v3.12297 -t Test2 -f ../tests.pw
merge.sh: #8056: Creating SDR Key  - PASSED
merge.sh: Merging in Key for Existing user
certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id dave --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw
upgrade complete!
merge.sh: #8057: Merging Dave  - PASSED
merge.sh: Merging in new user 
certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id server --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw
upgrade complete!
merge.sh: #8058: Merging server  - PASSED
merge.sh: Merging in new chain 
certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id ext_client --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw
upgrade complete!
merge.sh: #8059: Merging ext_client  - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict1 --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw
upgrade complete!
merge.sh: #8060: Merging conflicting nicknames 1  - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict2 --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw
upgrade complete!
merge.sh: #8061: Merging conflicting nicknames 2  - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #4)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 45 (0x2d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:49 2012
            Not After : Mon Nov 27 23:55:49 2017
        Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain
             View,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c4:fd:27:e3:74:a9:b3:71:3a:51:b8:78:9e:f5:59:aa:
                    3d:d9:b6:c6:64:12:ae:04:69:bf:52:0e:73:4f:72:b6:
                    ba:1e:85:75:97:8d:ec:27:ac:a4:71:6a:0f:88:75:0a:
                    37:b8:cb:08:c7:ff:28:27:b1:f5:cf:6f:a4:2d:26:b1:
                    d2:5d:8b:1f:7a:1e:e9:3c:57:05:c1:5e:16:61:9c:60:
                    88:57:c2:5c:7f:bf:4d:b7:31:7f:21:a4:cf:f6:ea:da:
                    43:e9:ce:99:01:c4:89:be:02:34:45:38:00:db:1a:d0:
                    24:5c:26:62:06:06:9d:c8:8b:33:04:f6:eb:2d:d5:4d
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        2b:73:d3:5a:47:c3:36:55:a3:3e:50:11:76:0b:7a:93:
        13:ff:d3:b3:a4:59:07:35:7d:ea:4d:33:34:96:9c:bb:
        3e:88:2a:d7:fc:ec:e1:a3:8a:27:25:d7:07:31:70:56:
        9f:77:01:b8:f5:8d:0b:95:aa:97:bf:61:38:f2:15:62:
        24:3a:92:77:6e:47:8f:85:dc:c5:2a:3a:33:b4:16:2c:
        d7:29:54:3b:d8:2a:f3:31:14:a6:d0:4c:cf:0b:aa:11:
        c3:8f:46:15:a6:6f:da:02:1a:98:c4:18:b9:93:fa:70:
        e8:c8:6e:04:52:69:f9:e2:87:e1:77:aa:96:9f:0c:08
    Fingerprint (MD5):
        2A:C2:4C:91:7F:5E:7C:2B:88:66:DA:8F:20:7A:0F:B2
    Fingerprint (SHA1):
        6A:DC:C1:78:A4:DD:54:BC:A9:89:EA:3D:C6:3D:3D:6D:A4:96:0B:0D

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

merge.sh: #8062: Verify nicknames were deconflicted (Alice #4)  - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #100)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 46 (0x2e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Tue Nov 27 23:55:50 2012
            Not After : Mon Nov 27 23:55:50 2017
        Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain
             View,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f3:26:a9:78:57:e0:f8:fb:76:ac:fe:47:ab:a3:45:6c:
                    f9:24:03:c5:9c:c0:5e:3f:cb:cd:fd:b2:51:a4:06:65:
                    5d:60:39:01:20:fb:fd:77:6c:e4:13:1c:0a:3c:9c:c2:
                    d4:81:ad:8e:8f:00:35:0f:70:39:d0:6b:07:7f:b2:72:
                    4e:05:dc:73:ac:8c:be:68:f5:de:87:74:0e:52:14:41:
                    a0:46:e1:f4:a5:54:7d:b0:e2:ee:6c:cc:3b:d8:12:69:
                    39:c3:d0:48:52:90:d6:8d:e5:1f:56:5e:da:5e:d6:71:
                    c2:7b:a4:69:39:2e:01:9b:c6:50:2a:6d:03:c4:6b:23
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0b:d2:32:15:d7:17:f9:92:b9:c5:19:78:d1:83:5c:ba:
        31:64:8a:32:97:e1:73:f4:d4:d4:4b:0b:94:19:91:8c:
        dd:6e:e4:88:ec:16:90:f5:fc:13:84:7a:5a:3d:0c:df:
        66:8d:2a:87:3b:65:33:da:d6:44:7b:74:00:8e:41:3d:
        cb:b6:0b:df:51:f9:9b:0b:12:b8:cc:9d:b0:89:d7:06:
        43:8b:2d:23:0f:86:9a:e4:05:a0:f5:8b:95:96:de:79:
        55:dc:15:eb:69:6c:97:08:ce:52:7d:88:93:65:06:5f:
        13:fb:3a:85:36:21:8e:f2:f1:e7:c2:1c:59:7f:72:7e
    Fingerprint (MD5):
        8C:7E:14:D4:4A:A7:5A:8A:60:61:66:30:DD:08:69:88
    Fingerprint (SHA1):
        84:B4:E5:49:EC:D3:08:A3:BD:2B:D0:11:CF:E3:C0:24:80:90:C2:09

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

merge.sh: #8063: Verify nicknames were deconflicted (Alice #100)  - PASSED
merge.sh: Merging in SDR 
certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id sdr --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw
upgrade complete!
merge.sh: #8064: Merging SDR  - PASSED

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

Alice                                                        u,u,u
Alice-ec                                                     u,u,u
bob@bogus.com                                                ,,   
Dave                                                         u,u,u
eve@bogus.com                                                ,,   
bob-ec@bogus.com                                             ,,   
Dave-ec                                                      u,u,u
TestCA                                                       CT,C,C
TestCA-ec                                                    CT,C,C
Alice-ecmixed                                                u,u,u
Dave-ecmixed                                                 u,u,u
buildnss02.usersys.redhat.com                                u,u,u
buildnss02.usersys.redhat.com-ec                             u,u,u
buildnss02-sni.usersys.redhat.com-ecmixed                    u,u,u
buildnss02.usersys.redhat.com-ecmixed                        u,u,u
buildnss02-sni.usersys.redhat.com                            u,u,u
buildnss02-sni.usersys.redhat.com-ec                         u,u,u
ExtendedSSLUser-ecmixed                                      u,u,u
chain-2-clientCA-ec                                          ,,   
clientCA                                                     T,C,C
chain-2-clientCA                                             ,,   
clientCA-ec                                                  T,C,C
ExtendedSSLUser                                              u,u,u
serverCA                                                     C,C,C
ExtendedSSLUser-ec                                           u,u,u
serverCA-ec                                                  C,C,C
chain-1-clientCA-ec                                          ,,   
chain-1-clientCA                                             ,,   
Alice #1                                                     ,,   
Alice #2                                                     ,,   
Alice #99                                                    ,,   
Alice #3                                                     ,,   
Alice #100                                                   ,,   
Alice #4                                                     ,,   


CRL names                                CRL Type

TestCA                                   CRL  
TestCA-ec                                CRL  
merge.sh: Decrypt - With Original SDR Key
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/tests.v3.12297 -t Test2 -f ../tests.pw
merge.sh: #8065: Decrypt - Value 3  - PASSED
merge.sh: Decrypt - With Merged SDR Key
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/upgradedb/tests.v1.12297 -t Test1 -f ../tests.pw
merge.sh: #8066: Decrypt - Value 1  - PASSED
merge.sh: Signing with merged key  ------------------
cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig
merge.sh: #8067: Create Detached Signature Dave . - PASSED
cmsutil -D -i dave.dsig -c alice.txt -d . 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
merge.sh: #8068: Verifying Dave's Detached Signature  - PASSED
merge.sh: verifying  merged cert  ------------------
certutil -V -n ExtendedSSLUser -u C -d .
certutil: certificate is valid
merge.sh: #8069: Verifying ExtendedSSL User Cert  - PASSED
merge.sh: verifying  merged crl  ------------------
crlutil -L -n TestCA -d .
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US"
    This Update: Tue Nov 27 23:55:59 2012
    Entry 1 (0x1):
        Serial Number: 40 (0x28)
        Revocation Date: Tue Nov 27 23:55:14 2012
        Entry Extensions:
            Name: CRL reason code

    Entry 2 (0x2):
        Serial Number: 42 (0x2a)
        Revocation Date: Tue Nov 27 23:55:57 2012
    CRL Extensions:
        Name: Certificate Issuer Alt Name
        RFC822 Name: "caemail@ca.com"
        DNS name: "ca.com"
        Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo
            rnia,C=US"
        URI: "http://ca.com"
        IP Address:
            87:0b:31:39:32:2e:31:36:38:2e:30:2e:31

merge.sh: #8070: Verifying TestCA CRL  - PASSED
TIMESTAMP merge END: Tue Nov 27 19:24:27 EST 2012
merge.sh: Testing with shared library ===============================
Running tests for lowhash
TIMESTAMP lowhash BEGIN: Tue Nov 27 19:24:27 EST 2012
lowhash.sh: Lowhash Tests ===============================
lowhashtest with fips mode=
lowhashtest MD5
lowhash.sh: #8071: lowhashtest with fips mode= for MD5  - PASSED
lowhashtest SHA1
lowhash.sh: #8072: lowhashtest with fips mode= for SHA1  - PASSED
lowhashtest SHA224
lowhash.sh: #8073: lowhashtest with fips mode= for SHA224  - PASSED
lowhashtest SHA256
lowhash.sh: #8074: lowhashtest with fips mode= for SHA256  - PASSED
lowhashtest SHA384
lowhash.sh: #8075: lowhashtest with fips mode= for SHA384  - PASSED
lowhashtest SHA512
lowhash.sh: #8076: lowhashtest with fips mode= for SHA512  - PASSED
lowhashtest with fips mode=
lowhashtest MD5
lowhash.sh: #8077: lowhashtest with fips mode= for MD5  - PASSED
lowhashtest SHA1
lowhash.sh: #8078: lowhashtest with fips mode= for SHA1  - PASSED
lowhashtest SHA224
lowhash.sh: #8079: lowhashtest with fips mode= for SHA224  - PASSED
lowhashtest SHA256
lowhash.sh: #8080: lowhashtest with fips mode= for SHA256  - PASSED
lowhashtest SHA384
lowhash.sh: #8081: lowhashtest with fips mode= for SHA384  - PASSED
lowhashtest SHA512
lowhash.sh: #8082: lowhashtest with fips mode= for SHA512  - PASSED
lowhash.sh done
TIMESTAMP lowhash END: Tue Nov 27 19:24:28 EST 2012
Running tests for cert
TIMESTAMP cert BEGIN: Tue Nov 27 19:24:28 EST 2012
cert.sh: Certutil and Crlutil Tests with ECC ===============================
cert.sh: #8083: Looking for root certs module. - PASSED
cert.sh: Creating a CA Certificate TestCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/CA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/CA -f ../tests.pw
cert.sh: #8084: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/CA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8085: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert TestCA  --------------------------
certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8086: Creating CA Cert TestCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n TestCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/CA -o root.cert
cert.sh: #8087: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate serverCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA -f ../tests.pw
cert.sh: #8088: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8089: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert serverCA  --------------------------
certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8090: Creating CA Cert serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n serverCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA -o root.cert
cert.sh: #8091: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-serverCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA
cert.sh: Creating CA Cert chain-1-serverCA  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8092: Creating CA Cert chain-1-serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-serverCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA -o root.cert
cert.sh: #8093: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-serverCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA
cert.sh: Creating CA Cert chain-2-serverCA  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8094: Creating CA Cert chain-2-serverCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-serverCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA -o root.cert
cert.sh: #8095: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate clientCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA -f ../tests.pw
cert.sh: #8096: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8097: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert clientCA  --------------------------
certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8098: Creating CA Cert clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n clientCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA -o root.cert
cert.sh: #8099: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-clientCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA
cert.sh: Creating CA Cert chain-1-clientCA  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8100: Creating CA Cert chain-1-clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-clientCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA -o root.cert
cert.sh: #8101: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-clientCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA
cert.sh: Creating CA Cert chain-2-clientCA  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8102: Creating CA Cert chain-2-clientCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-clientCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA -o root.cert
cert.sh: #8103: Exporting Root Cert - PASSED
cert.sh: Creating an EC CA Certificate TestCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/CA
cert.sh: Creating EC CA Cert TestCA-ec  --------------------------
certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8104: Creating EC CA Cert TestCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n TestCA-ec -r -d . -o ecroot.cert
cert.sh: #8105: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate serverCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA
cert.sh: Creating EC CA Cert serverCA-ec  --------------------------
certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8106: Creating EC CA Cert serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n serverCA-ec -r -d . -o ecroot.cert
cert.sh: #8107: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA
cert.sh: Creating EC CA Cert chain-1-serverCA-ec  --------------------------
certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8108: Creating EC CA Cert chain-1-serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #8109: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA
cert.sh: Creating EC CA Cert chain-2-serverCA-ec  --------------------------
certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8110: Creating EC CA Cert chain-2-serverCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #8111: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate clientCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA
cert.sh: Creating EC CA Cert clientCA-ec  --------------------------
certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8112: Creating EC CA Cert clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n clientCA-ec -r -d . -o ecroot.cert
cert.sh: #8113: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA
cert.sh: Creating EC CA Cert chain-1-clientCA-ec  --------------------------
certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8114: Creating EC CA Cert chain-1-clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #8115: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA
cert.sh: Creating EC CA Cert chain-2-clientCA-ec  --------------------------
certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8116: Creating EC CA Cert chain-2-clientCA-ec  - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #8117: Exporting EC Root Cert - PASSED
cert.sh: Creating Certificates, issued by the last ===============
     of a chain of CA's which are not in the same database============
Server Cert
cert.sh: Initializing buildnss02.usersys.redhat.com's Cert DB (ext.) --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -f ../tests.pw
cert.sh: #8118: Initializing buildnss02.usersys.redhat.com's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8119: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for buildnss02.usersys.redhat.com (ext) --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8120: Generate Cert Request for buildnss02.usersys.redhat.com (ext) - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 200 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA -i req -o buildnss02.usersys.redhat.com.cert -f ../tests.pw
cert.sh: #8121: Sign buildnss02.usersys.redhat.com's Request (ext) - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's Cert  -t u,u,u (ext) --------------------------
certutil -A -n buildnss02.usersys.redhat.com -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -f ../tests.pw -i buildnss02.usersys.redhat.com.cert
cert.sh: #8122: Import buildnss02.usersys.redhat.com's Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n clientCA -t T,, -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA/clientCA.ca.cert
cert.sh: #8123: Import Client Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Generate EC Cert Request for buildnss02.usersys.redhat.com (ext) --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8124: Generate EC Cert Request for buildnss02.usersys.redhat.com (ext) - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA -i req -o buildnss02.usersys.redhat.com-ec.cert -f ../tests.pw
cert.sh: #8125: Sign buildnss02.usersys.redhat.com's EC Request (ext) - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's EC Cert  -t u,u,u (ext) --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -f ../tests.pw -i buildnss02.usersys.redhat.com-ec.cert
cert.sh: #8126: Import buildnss02.usersys.redhat.com's EC Cert  -t u,u,u (ext) - PASSED
cert.sh: Import Client EC Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) --------------------------
certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA/clientCA-ec.ca.cert
cert.sh: #8127: Import Client EC Root CA -t T,, for buildnss02.usersys.redhat.com (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com (ext) --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8128: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com (ext) - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 201 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA -i req -o buildnss02.usersys.redhat.com-ecmixed.cert -f ../tests.pw
cert.sh: #8129: Sign buildnss02.usersys.redhat.com's mixed EC Request (ext) - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's mixed EC Cert  -t u,u,u (ext) --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -f ../tests.pw -i buildnss02.usersys.redhat.com-ecmixed.cert
cert.sh: #8130: Import buildnss02.usersys.redhat.com's mixed EC Cert  -t u,u,u (ext) - PASSED
Importing all the server's own CA chain into the servers DB
cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA/chain-2-serverCA-ec.ca.cert
cert.sh: #8131: Import chain-2-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import chain-1-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA/chain-1-serverCA.ca.cert
cert.sh: #8132: Import chain-1-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import serverCA CA -t C,C,C for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA/serverCA.ca.cert
cert.sh: #8133: Import serverCA CA -t C,C,C for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import chain-2-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA/chain-2-serverCA.ca.cert
cert.sh: #8134: Import chain-2-serverCA CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import serverCA-ec CA -t C,C,C for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA/serverCA-ec.ca.cert
cert.sh: #8135: Import serverCA-ec CA -t C,C,C for buildnss02.usersys.redhat.com (ext.)  - PASSED
cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  --------------------------
certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_server -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA/chain-1-serverCA-ec.ca.cert
cert.sh: #8136: Import chain-1-serverCA-ec CA -t u,u,u for buildnss02.usersys.redhat.com (ext.)  - PASSED
Client Cert
cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -f ../tests.pw
cert.sh: #8137: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8138: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8139: Generate Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 300 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw
cert.sh: #8140: Sign ExtendedSSLUser's Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser.cert
cert.sh: #8141: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA/serverCA.ca.cert
cert.sh: #8142: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8143: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw
cert.sh: #8144: Sign ExtendedSSLUser's EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert
cert.sh: #8145: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA/serverCA-ec.ca.cert
cert.sh: #8146: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8147: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 301 -v 60 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw
cert.sh: #8148: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert
cert.sh: #8149: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED
Importing all the client's own CA chain into the servers DB
cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA/chain-2-clientCA-ec.ca.cert
cert.sh: #8150: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA/clientCA.ca.cert
cert.sh: #8151: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA/chain-2-clientCA.ca.cert
cert.sh: #8152: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA/clientCA-ec.ca.cert
cert.sh: #8153: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA/chain-1-clientCA-ec.ca.cert
cert.sh: #8154: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ext_client -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/clientCA/chain-1-clientCA.ca.cert
cert.sh: #8155: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh SUCCESS: EXT passed
cert.sh: Creating Client CA Issued Certificates ===============
cert.sh: Initializing TestUser's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw
cert.sh: #8156: Initializing TestUser's Cert DB - PASSED
cert.sh: Loading root cert module to TestUser's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8157: Loading root cert module to TestUser's Cert DB - PASSED
cert.sh: Import Root CA for TestUser --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -i ../CA/TestCA.ca.cert
cert.sh: #8158: Import Root CA for TestUser - PASSED
cert.sh: Import EC Root CA for TestUser --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -i ../CA/TestCA-ec.ca.cert
cert.sh: #8159: Import EC Root CA for TestUser - PASSED
cert.sh: Generate Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8160: Generate Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's Request --------------------------
certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw 
cert.sh: #8161: Sign TestUser's Request - PASSED
cert.sh: Import TestUser's Cert --------------------------
certutil -A -n TestUser -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser.cert
cert.sh: #8162: Import TestUser's Cert - PASSED
cert.sh SUCCESS: TestUser's Cert Created
cert.sh: Generate EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8163: Generate EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request --------------------------
certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw 
cert.sh: #8164: Sign TestUser's EC Request - PASSED
cert.sh: Import TestUser's EC Cert --------------------------
certutil -A -n TestUser-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser-ec.cert
cert.sh: #8165: Import TestUser's EC Cert - PASSED
cert.sh SUCCESS: TestUser's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8166: Generate mixed EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw 
cert.sh: #8167: Sign TestUser's EC Request with RSA - PASSED
cert.sh: Import TestUser's mixed EC Cert --------------------------
certutil -A -n TestUser-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser-ecmixed.cert
cert.sh: #8168: Import TestUser's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
             buildnss02.usersys.redhat.com ------------------------------------
cert.sh: Initializing buildnss02.usersys.redhat.com's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw
cert.sh: #8169: Initializing buildnss02.usersys.redhat.com's Cert DB - PASSED
cert.sh: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8170: Loading root cert module to buildnss02.usersys.redhat.com's Cert DB - PASSED
cert.sh: Import Root CA for buildnss02.usersys.redhat.com --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server -i ../CA/TestCA.ca.cert
cert.sh: #8171: Import Root CA for buildnss02.usersys.redhat.com - PASSED
cert.sh: Import EC Root CA for buildnss02.usersys.redhat.com --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server -i ../CA/TestCA-ec.ca.cert
cert.sh: #8172: Import EC Root CA for buildnss02.usersys.redhat.com - PASSED
cert.sh: Generate Cert Request for buildnss02.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8173: Generate Cert Request for buildnss02.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's Request --------------------------
certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o buildnss02.usersys.redhat.com.cert -f ../tests.pw 
cert.sh: #8174: Sign buildnss02.usersys.redhat.com's Request - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's Cert --------------------------
certutil -A -n buildnss02.usersys.redhat.com -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw -i buildnss02.usersys.redhat.com.cert
cert.sh: #8175: Import buildnss02.usersys.redhat.com's Cert - PASSED
cert.sh SUCCESS: buildnss02.usersys.redhat.com's Cert Created
cert.sh: Generate EC Cert Request for buildnss02.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8176: Generate EC Cert Request for buildnss02.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's EC Request --------------------------
certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o buildnss02.usersys.redhat.com-ec.cert -f ../tests.pw 
cert.sh: #8177: Sign buildnss02.usersys.redhat.com's EC Request - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's EC Cert --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw -i buildnss02.usersys.redhat.com-ec.cert
cert.sh: #8178: Import buildnss02.usersys.redhat.com's EC Cert - PASSED
cert.sh SUCCESS: buildnss02.usersys.redhat.com's EC Cert Created
cert.sh: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02.usersys.redhat.com, E=buildnss02.usersys.redhat.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8179: Generate mixed EC Cert Request for buildnss02.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02.usersys.redhat.com's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o buildnss02.usersys.redhat.com-ecmixed.cert -f ../tests.pw 
cert.sh: #8180: Sign buildnss02.usersys.redhat.com's EC Request with RSA - PASSED
cert.sh: Import buildnss02.usersys.redhat.com's mixed EC Cert --------------------------
certutil -A -n buildnss02.usersys.redhat.com-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw -i buildnss02.usersys.redhat.com-ecmixed.cert
cert.sh: #8181: Import buildnss02.usersys.redhat.com's mixed EC Cert - PASSED
cert.sh SUCCESS: buildnss02.usersys.redhat.com's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
             buildnss02.usersys.redhat.com-sni --------------------------------
cert.sh: Generate Cert Request for buildnss02-sni.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02-sni.usersys.redhat.com, E=buildnss02-sni.usersys.redhat.com@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8182: Generate Cert Request for buildnss02-sni.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02-sni.usersys.redhat.com's Request --------------------------
certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o buildnss02-sni.usersys.redhat.com.cert -f ../tests.pw 
cert.sh: #8183: Sign buildnss02-sni.usersys.redhat.com's Request - PASSED
cert.sh: Import buildnss02-sni.usersys.redhat.com's Cert --------------------------
certutil -A -n buildnss02-sni.usersys.redhat.com -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw -i buildnss02-sni.usersys.redhat.com.cert
cert.sh: #8184: Import buildnss02-sni.usersys.redhat.com's Cert - PASSED
cert.sh SUCCESS: buildnss02-sni.usersys.redhat.com's Cert Created
cert.sh: Generate EC Cert Request for buildnss02-sni.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02-sni.usersys.redhat.com, E=buildnss02-sni.usersys.redhat.com-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8185: Generate EC Cert Request for buildnss02-sni.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02-sni.usersys.redhat.com's EC Request --------------------------
certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o buildnss02-sni.usersys.redhat.com-ec.cert -f ../tests.pw 
cert.sh: #8186: Sign buildnss02-sni.usersys.redhat.com's EC Request - PASSED
cert.sh: Import buildnss02-sni.usersys.redhat.com's EC Cert --------------------------
certutil -A -n buildnss02-sni.usersys.redhat.com-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw -i buildnss02-sni.usersys.redhat.com-ec.cert
cert.sh: #8187: Import buildnss02-sni.usersys.redhat.com's EC Cert - PASSED
cert.sh SUCCESS: buildnss02-sni.usersys.redhat.com's EC Cert Created
cert.sh: Generate mixed EC Cert Request for buildnss02-sni.usersys.redhat.com --------------------------
certutil -s "CN=buildnss02-sni.usersys.redhat.com, E=buildnss02-sni.usersys.redhat.com-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8188: Generate mixed EC Cert Request for buildnss02-sni.usersys.redhat.com - PASSED
cert.sh: Sign buildnss02-sni.usersys.redhat.com's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o buildnss02-sni.usersys.redhat.com-ecmixed.cert -f ../tests.pw 
cert.sh: #8189: Sign buildnss02-sni.usersys.redhat.com's EC Request with RSA - PASSED
cert.sh: Import buildnss02-sni.usersys.redhat.com's mixed EC Cert --------------------------
certutil -A -n buildnss02-sni.usersys.redhat.com-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw -i buildnss02-sni.usersys.redhat.com-ecmixed.cert
cert.sh: #8190: Import buildnss02-sni.usersys.redhat.com's mixed EC Cert - PASSED
cert.sh SUCCESS: buildnss02-sni.usersys.redhat.com's mixed EC Cert Created
cert.sh: Modify trust attributes of Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA -t TC,TC,TC -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw
cert.sh: #8191: Modify trust attributes of Root CA -t TC,TC,TC - PASSED
cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA-ec -t TC,TC,TC -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server -f ../tests.pw
cert.sh: #8192: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED
cert.sh SUCCESS: SSL passed
cert.sh: Creating Client CA Issued Certificates ==============
cert.sh: Initializing Alice's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/alicedir -f ../tests.pw
cert.sh: #8193: Initializing Alice's Cert DB - PASSED
cert.sh: Loading root cert module to Alice's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/alicedir

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8194: Loading root cert module to Alice's Cert DB - PASSED
cert.sh: Import Root CA for Alice --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/alicedir -i ../CA/TestCA.ca.cert
cert.sh: #8195: Import Root CA for Alice - PASSED
cert.sh: Import EC Root CA for Alice --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/alicedir -i ../CA/TestCA-ec.ca.cert
cert.sh: #8196: Import EC Root CA for Alice - PASSED
cert.sh: Generate Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8197: Generate Cert Request for Alice - PASSED
cert.sh: Sign Alice's Request --------------------------
certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw 
cert.sh: #8198: Sign Alice's Request - PASSED
cert.sh: Import Alice's Cert --------------------------
certutil -A -n Alice -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/alicedir -f ../tests.pw -i Alice.cert
cert.sh: #8199: Import Alice's Cert - PASSED
cert.sh SUCCESS: Alice's Cert Created
cert.sh: Generate EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8200: Generate EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request --------------------------
certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw 
cert.sh: #8201: Sign Alice's EC Request - PASSED
cert.sh: Import Alice's EC Cert --------------------------
certutil -A -n Alice-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/alicedir -f ../tests.pw -i Alice-ec.cert
cert.sh: #8202: Import Alice's EC Cert - PASSED
cert.sh SUCCESS: Alice's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8203: Generate mixed EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw 
cert.sh: #8204: Sign Alice's EC Request with RSA - PASSED
cert.sh: Import Alice's mixed EC Cert --------------------------
certutil -A -n Alice-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/alicedir -f ../tests.pw -i Alice-ecmixed.cert
cert.sh: #8205: Import Alice's mixed EC Cert - PASSED
cert.sh SUCCESS: Alice's mixed EC Cert Created
cert.sh: Initializing Bob's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/bobdir -f ../tests.pw
cert.sh: #8206: Initializing Bob's Cert DB - PASSED
cert.sh: Loading root cert module to Bob's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/bobdir

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8207: Loading root cert module to Bob's Cert DB - PASSED
cert.sh: Import Root CA for Bob --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/bobdir -i ../CA/TestCA.ca.cert
cert.sh: #8208: Import Root CA for Bob - PASSED
cert.sh: Import EC Root CA for Bob --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/bobdir -i ../CA/TestCA-ec.ca.cert
cert.sh: #8209: Import EC Root CA for Bob - PASSED
cert.sh: Generate Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8210: Generate Cert Request for Bob - PASSED
cert.sh: Sign Bob's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw 
cert.sh: #8211: Sign Bob's Request - PASSED
cert.sh: Import Bob's Cert --------------------------
certutil -A -n Bob -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/bobdir -f ../tests.pw -i Bob.cert
cert.sh: #8212: Import Bob's Cert - PASSED
cert.sh SUCCESS: Bob's Cert Created
cert.sh: Generate EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8213: Generate EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw 
cert.sh: #8214: Sign Bob's EC Request - PASSED
cert.sh: Import Bob's EC Cert --------------------------
certutil -A -n Bob-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/bobdir -f ../tests.pw -i Bob-ec.cert
cert.sh: #8215: Import Bob's EC Cert - PASSED
cert.sh SUCCESS: Bob's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8216: Generate mixed EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw 
cert.sh: #8217: Sign Bob's EC Request with RSA - PASSED
cert.sh: Import Bob's mixed EC Cert --------------------------
certutil -A -n Bob-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/bobdir -f ../tests.pw -i Bob-ecmixed.cert
cert.sh: #8218: Import Bob's mixed EC Cert - PASSED
cert.sh SUCCESS: Bob's mixed EC Cert Created
cert.sh: Creating Dave's Certificate -------------------------
cert.sh: Initializing Dave's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/dave -f ../tests.pw
cert.sh: #8219: Initializing Dave's Cert DB - PASSED
cert.sh: Loading root cert module to Dave's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/dave

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8220: Loading root cert module to Dave's Cert DB - PASSED
cert.sh: Import Root CA for Dave --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/dave -i ../CA/TestCA.ca.cert
cert.sh: #8221: Import Root CA for Dave - PASSED
cert.sh: Import EC Root CA for Dave --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/dave -i ../CA/TestCA-ec.ca.cert
cert.sh: #8222: Import EC Root CA for Dave - PASSED
cert.sh: Generate Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8223: Generate Cert Request for Dave - PASSED
cert.sh: Sign Dave's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw 
cert.sh: #8224: Sign Dave's Request - PASSED
cert.sh: Import Dave's Cert --------------------------
certutil -A -n Dave -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/dave -f ../tests.pw -i Dave.cert
cert.sh: #8225: Import Dave's Cert - PASSED
cert.sh SUCCESS: Dave's Cert Created
cert.sh: Generate EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8226: Generate EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw 
cert.sh: #8227: Sign Dave's EC Request - PASSED
cert.sh: Import Dave's EC Cert --------------------------
certutil -A -n Dave-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/dave -f ../tests.pw -i Dave-ec.cert
cert.sh: #8228: Import Dave's EC Cert - PASSED
cert.sh SUCCESS: Dave's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8229: Generate mixed EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw 
cert.sh: #8230: Sign Dave's EC Request with RSA - PASSED
cert.sh: Import Dave's mixed EC Cert --------------------------
certutil -A -n Dave-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/dave -f ../tests.pw -i Dave-ecmixed.cert
cert.sh: #8231: Import Dave's mixed EC Cert - PASSED
cert.sh SUCCESS: Dave's mixed EC Cert Created
cert.sh: Creating multiEmail's Certificate --------------------
cert.sh: Initializing Eve's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eve -f ../tests.pw
cert.sh: #8232: Initializing Eve's Cert DB - PASSED
cert.sh: Loading root cert module to Eve's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eve

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8233: Loading root cert module to Eve's Cert DB - PASSED
cert.sh: Import Root CA for Eve --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eve -i ../CA/TestCA.ca.cert
cert.sh: #8234: Import Root CA for Eve - PASSED
cert.sh: Import EC Root CA for Eve --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eve -i ../CA/TestCA-ec.ca.cert
cert.sh: #8235: Import EC Root CA for Eve - PASSED
cert.sh: Generate Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8236: Generate Cert Request for Eve - PASSED
cert.sh: Sign Eve's Request --------------------------
certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #8237: Sign Eve's Request - PASSED
cert.sh: Import Eve's Cert --------------------------
certutil -A -n Eve -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eve -f ../tests.pw -i Eve.cert
cert.sh: #8238: Import Eve's Cert - PASSED
cert.sh SUCCESS: Eve's Cert Created
cert.sh: Generate EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8239: Generate EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request --------------------------
certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #8240: Sign Eve's EC Request - PASSED
cert.sh: Import Eve's EC Cert --------------------------
certutil -A -n Eve-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eve -f ../tests.pw -i Eve-ec.cert
cert.sh: #8241: Import Eve's EC Cert - PASSED
cert.sh SUCCESS: Eve's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8242: Generate mixed EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #8243: Sign Eve's EC Request with RSA - PASSED
cert.sh: Import Eve's mixed EC Cert --------------------------
certutil -A -n Eve-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eve -f ../tests.pw -i Eve-ecmixed.cert
cert.sh: #8244: Import Eve's mixed EC Cert - PASSED
cert.sh SUCCESS: Eve's mixed EC Cert Created
cert.sh: Importing Certificates ==============================
cert.sh: Import Bob's cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert
cert.sh: #8245: Import Bob's cert into Alice's db - PASSED
cert.sh: Import Dave's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #8246: Import Dave's cert into Alice's DB - PASSED
cert.sh: Import Dave's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #8247: Import Dave's cert into Bob's DB - PASSED
cert.sh: Import Eve's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #8248: Import Eve's cert into Alice's DB - PASSED
cert.sh: Import Eve's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #8249: Import Eve's cert into Bob's DB - PASSED
cert.sh: Importing EC Certificates ==============================
cert.sh: Import Bob's EC cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert
cert.sh: #8250: Import Bob's EC cert into Alice's db - PASSED
cert.sh: Import Dave's EC cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #8251: Import Dave's EC cert into Alice's DB - PASSED
cert.sh: Import Dave's EC cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #8252: Import Dave's EC cert into Bob's DB - PASSED
cert.sh SUCCESS: SMIME passed
cert.sh: Creating FIPS 140 DSA Certificates ==============
cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips -f ../tests.fipspw
cert.sh: #8253: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED
cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8254: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED
cert.sh: Enable FIPS mode on database -----------------------
modutil -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips -fips true 

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
FIPS mode enabled.
cert.sh: #8255: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED
cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate --------------------------
certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise


Generating key.  This may take a few moments...

cert.sh: #8256: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED
cert.sh SUCCESS: FIPS passed
cert.sh: Creating Server CA Issued Certificate for 
             EC Curves Test Certificates ------------------------------------
cert.sh: Initializing EC Curve's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw
cert.sh: #8257: Initializing EC Curve's Cert DB - PASSED
cert.sh: Loading root cert module to EC Curve's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8258: Loading root cert module to EC Curve's Cert DB - PASSED
cert.sh: Import EC Root CA for EC Curves Test Certificates --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -i ../CA/TestCA-ec.ca.cert
cert.sh: #8259: Import EC Root CA for EC Curves Test Certificates - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v1 --------------------------
certutil -s "CN=Curve-c2pnb163v1, E=Curve-c2pnb163v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8260: Generate EC Cert Request for Curve-c2pnb163v1 - PASSED
cert.sh: Sign Curve-c2pnb163v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-c2pnb163v1-ec.cert -f ../tests.pw 
cert.sh: #8261: Sign Curve-c2pnb163v1's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v1's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2pnb163v1-ec.cert
cert.sh: #8262: Import Curve-c2pnb163v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v2 --------------------------
certutil -s "CN=Curve-c2pnb163v2, E=Curve-c2pnb163v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8263: Generate EC Cert Request for Curve-c2pnb163v2 - PASSED
cert.sh: Sign Curve-c2pnb163v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-c2pnb163v2-ec.cert -f ../tests.pw 
cert.sh: #8264: Sign Curve-c2pnb163v2's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v2's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2pnb163v2-ec.cert
cert.sh: #8265: Import Curve-c2pnb163v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb163v3 --------------------------
certutil -s "CN=Curve-c2pnb163v3, E=Curve-c2pnb163v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb163v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8266: Generate EC Cert Request for Curve-c2pnb163v3 - PASSED
cert.sh: Sign Curve-c2pnb163v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-c2pnb163v3-ec.cert -f ../tests.pw 
cert.sh: #8267: Sign Curve-c2pnb163v3's EC Request - PASSED
cert.sh: Import Curve-c2pnb163v3's EC Cert --------------------------
certutil -A -n Curve-c2pnb163v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2pnb163v3-ec.cert
cert.sh: #8268: Import Curve-c2pnb163v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb176v1 --------------------------
certutil -s "CN=Curve-c2pnb176v1, E=Curve-c2pnb176v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb176v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8269: Generate EC Cert Request for Curve-c2pnb176v1 - PASSED
cert.sh: Sign Curve-c2pnb176v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2004 -v 60 -d ../CA -i req -o Curve-c2pnb176v1-ec.cert -f ../tests.pw 
cert.sh: #8270: Sign Curve-c2pnb176v1's EC Request - PASSED
cert.sh: Import Curve-c2pnb176v1's EC Cert --------------------------
certutil -A -n Curve-c2pnb176v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2pnb176v1-ec.cert
cert.sh: #8271: Import Curve-c2pnb176v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb208w1 --------------------------
certutil -s "CN=Curve-c2pnb208w1, E=Curve-c2pnb208w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb208w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8272: Generate EC Cert Request for Curve-c2pnb208w1 - PASSED
cert.sh: Sign Curve-c2pnb208w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2005 -v 60 -d ../CA -i req -o Curve-c2pnb208w1-ec.cert -f ../tests.pw 
cert.sh: #8273: Sign Curve-c2pnb208w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb208w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb208w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2pnb208w1-ec.cert
cert.sh: #8274: Import Curve-c2pnb208w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb272w1 --------------------------
certutil -s "CN=Curve-c2pnb272w1, E=Curve-c2pnb272w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb272w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8275: Generate EC Cert Request for Curve-c2pnb272w1 - PASSED
cert.sh: Sign Curve-c2pnb272w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2006 -v 60 -d ../CA -i req -o Curve-c2pnb272w1-ec.cert -f ../tests.pw 
cert.sh: #8276: Sign Curve-c2pnb272w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb272w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb272w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2pnb272w1-ec.cert
cert.sh: #8277: Import Curve-c2pnb272w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb304w1 --------------------------
certutil -s "CN=Curve-c2pnb304w1, E=Curve-c2pnb304w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb304w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8278: Generate EC Cert Request for Curve-c2pnb304w1 - PASSED
cert.sh: Sign Curve-c2pnb304w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2007 -v 60 -d ../CA -i req -o Curve-c2pnb304w1-ec.cert -f ../tests.pw 
cert.sh: #8279: Sign Curve-c2pnb304w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb304w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb304w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2pnb304w1-ec.cert
cert.sh: #8280: Import Curve-c2pnb304w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2pnb368w1 --------------------------
certutil -s "CN=Curve-c2pnb368w1, E=Curve-c2pnb368w1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2pnb368w1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8281: Generate EC Cert Request for Curve-c2pnb368w1 - PASSED
cert.sh: Sign Curve-c2pnb368w1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2008 -v 60 -d ../CA -i req -o Curve-c2pnb368w1-ec.cert -f ../tests.pw 
cert.sh: #8282: Sign Curve-c2pnb368w1's EC Request - PASSED
cert.sh: Import Curve-c2pnb368w1's EC Cert --------------------------
certutil -A -n Curve-c2pnb368w1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2pnb368w1-ec.cert
cert.sh: #8283: Import Curve-c2pnb368w1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v1 --------------------------
certutil -s "CN=Curve-c2tnb191v1, E=Curve-c2tnb191v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8284: Generate EC Cert Request for Curve-c2tnb191v1 - PASSED
cert.sh: Sign Curve-c2tnb191v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2009 -v 60 -d ../CA -i req -o Curve-c2tnb191v1-ec.cert -f ../tests.pw 
cert.sh: #8285: Sign Curve-c2tnb191v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2tnb191v1-ec.cert
cert.sh: #8286: Import Curve-c2tnb191v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v2 --------------------------
certutil -s "CN=Curve-c2tnb191v2, E=Curve-c2tnb191v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8287: Generate EC Cert Request for Curve-c2tnb191v2 - PASSED
cert.sh: Sign Curve-c2tnb191v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2010 -v 60 -d ../CA -i req -o Curve-c2tnb191v2-ec.cert -f ../tests.pw 
cert.sh: #8288: Sign Curve-c2tnb191v2's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v2's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2tnb191v2-ec.cert
cert.sh: #8289: Import Curve-c2tnb191v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb191v3 --------------------------
certutil -s "CN=Curve-c2tnb191v3, E=Curve-c2tnb191v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb191v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8290: Generate EC Cert Request for Curve-c2tnb191v3 - PASSED
cert.sh: Sign Curve-c2tnb191v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2011 -v 60 -d ../CA -i req -o Curve-c2tnb191v3-ec.cert -f ../tests.pw 
cert.sh: #8291: Sign Curve-c2tnb191v3's EC Request - PASSED
cert.sh: Import Curve-c2tnb191v3's EC Cert --------------------------
certutil -A -n Curve-c2tnb191v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2tnb191v3-ec.cert
cert.sh: #8292: Import Curve-c2tnb191v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v1 --------------------------
certutil -s "CN=Curve-c2tnb239v1, E=Curve-c2tnb239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8293: Generate EC Cert Request for Curve-c2tnb239v1 - PASSED
cert.sh: Sign Curve-c2tnb239v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2012 -v 60 -d ../CA -i req -o Curve-c2tnb239v1-ec.cert -f ../tests.pw 
cert.sh: #8294: Sign Curve-c2tnb239v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2tnb239v1-ec.cert
cert.sh: #8295: Import Curve-c2tnb239v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v2 --------------------------
certutil -s "CN=Curve-c2tnb239v2, E=Curve-c2tnb239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8296: Generate EC Cert Request for Curve-c2tnb239v2 - PASSED
cert.sh: Sign Curve-c2tnb239v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2013 -v 60 -d ../CA -i req -o Curve-c2tnb239v2-ec.cert -f ../tests.pw 
cert.sh: #8297: Sign Curve-c2tnb239v2's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v2's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2tnb239v2-ec.cert
cert.sh: #8298: Import Curve-c2tnb239v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb239v3 --------------------------
certutil -s "CN=Curve-c2tnb239v3, E=Curve-c2tnb239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb239v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8299: Generate EC Cert Request for Curve-c2tnb239v3 - PASSED
cert.sh: Sign Curve-c2tnb239v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2014 -v 60 -d ../CA -i req -o Curve-c2tnb239v3-ec.cert -f ../tests.pw 
cert.sh: #8300: Sign Curve-c2tnb239v3's EC Request - PASSED
cert.sh: Import Curve-c2tnb239v3's EC Cert --------------------------
certutil -A -n Curve-c2tnb239v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2tnb239v3-ec.cert
cert.sh: #8301: Import Curve-c2tnb239v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb359v1 --------------------------
certutil -s "CN=Curve-c2tnb359v1, E=Curve-c2tnb359v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb359v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8302: Generate EC Cert Request for Curve-c2tnb359v1 - PASSED
cert.sh: Sign Curve-c2tnb359v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2015 -v 60 -d ../CA -i req -o Curve-c2tnb359v1-ec.cert -f ../tests.pw 
cert.sh: #8303: Sign Curve-c2tnb359v1's EC Request - PASSED
cert.sh: Import Curve-c2tnb359v1's EC Cert --------------------------
certutil -A -n Curve-c2tnb359v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2tnb359v1-ec.cert
cert.sh: #8304: Import Curve-c2tnb359v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-c2tnb431r1 --------------------------
certutil -s "CN=Curve-c2tnb431r1, E=Curve-c2tnb431r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q c2tnb431r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8305: Generate EC Cert Request for Curve-c2tnb431r1 - PASSED
cert.sh: Sign Curve-c2tnb431r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2016 -v 60 -d ../CA -i req -o Curve-c2tnb431r1-ec.cert -f ../tests.pw 
cert.sh: #8306: Sign Curve-c2tnb431r1's EC Request - PASSED
cert.sh: Import Curve-c2tnb431r1's EC Cert --------------------------
certutil -A -n Curve-c2tnb431r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-c2tnb431r1-ec.cert
cert.sh: #8307: Import Curve-c2tnb431r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb163 --------------------------
certutil -s "CN=Curve-nistb163, E=Curve-nistb163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb163 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8308: Generate EC Cert Request for Curve-nistb163 - PASSED
cert.sh: Sign Curve-nistb163's EC Request --------------------------
certutil -C -c TestCA-ec -m 2017 -v 60 -d ../CA -i req -o Curve-nistb163-ec.cert -f ../tests.pw 
cert.sh: #8309: Sign Curve-nistb163's EC Request - PASSED
cert.sh: Import Curve-nistb163's EC Cert --------------------------
certutil -A -n Curve-nistb163-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistb163-ec.cert
cert.sh: #8310: Import Curve-nistb163's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb233 --------------------------
certutil -s "CN=Curve-nistb233, E=Curve-nistb233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb233 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8311: Generate EC Cert Request for Curve-nistb233 - PASSED
cert.sh: Sign Curve-nistb233's EC Request --------------------------
certutil -C -c TestCA-ec -m 2018 -v 60 -d ../CA -i req -o Curve-nistb233-ec.cert -f ../tests.pw 
cert.sh: #8312: Sign Curve-nistb233's EC Request - PASSED
cert.sh: Import Curve-nistb233's EC Cert --------------------------
certutil -A -n Curve-nistb233-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistb233-ec.cert
cert.sh: #8313: Import Curve-nistb233's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb283 --------------------------
certutil -s "CN=Curve-nistb283, E=Curve-nistb283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb283 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8314: Generate EC Cert Request for Curve-nistb283 - PASSED
cert.sh: Sign Curve-nistb283's EC Request --------------------------
certutil -C -c TestCA-ec -m 2019 -v 60 -d ../CA -i req -o Curve-nistb283-ec.cert -f ../tests.pw 
cert.sh: #8315: Sign Curve-nistb283's EC Request - PASSED
cert.sh: Import Curve-nistb283's EC Cert --------------------------
certutil -A -n Curve-nistb283-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistb283-ec.cert
cert.sh: #8316: Import Curve-nistb283's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb409 --------------------------
certutil -s "CN=Curve-nistb409, E=Curve-nistb409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb409 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8317: Generate EC Cert Request for Curve-nistb409 - PASSED
cert.sh: Sign Curve-nistb409's EC Request --------------------------
certutil -C -c TestCA-ec -m 2020 -v 60 -d ../CA -i req -o Curve-nistb409-ec.cert -f ../tests.pw 
cert.sh: #8318: Sign Curve-nistb409's EC Request - PASSED
cert.sh: Import Curve-nistb409's EC Cert --------------------------
certutil -A -n Curve-nistb409-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistb409-ec.cert
cert.sh: #8319: Import Curve-nistb409's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistb571 --------------------------
certutil -s "CN=Curve-nistb571, E=Curve-nistb571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistb571 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8320: Generate EC Cert Request for Curve-nistb571 - PASSED
cert.sh: Sign Curve-nistb571's EC Request --------------------------
certutil -C -c TestCA-ec -m 2021 -v 60 -d ../CA -i req -o Curve-nistb571-ec.cert -f ../tests.pw 
cert.sh: #8321: Sign Curve-nistb571's EC Request - PASSED
cert.sh: Import Curve-nistb571's EC Cert --------------------------
certutil -A -n Curve-nistb571-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistb571-ec.cert
cert.sh: #8322: Import Curve-nistb571's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk163 --------------------------
certutil -s "CN=Curve-nistk163, E=Curve-nistk163-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk163 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8323: Generate EC Cert Request for Curve-nistk163 - PASSED
cert.sh: Sign Curve-nistk163's EC Request --------------------------
certutil -C -c TestCA-ec -m 2022 -v 60 -d ../CA -i req -o Curve-nistk163-ec.cert -f ../tests.pw 
cert.sh: #8324: Sign Curve-nistk163's EC Request - PASSED
cert.sh: Import Curve-nistk163's EC Cert --------------------------
certutil -A -n Curve-nistk163-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistk163-ec.cert
cert.sh: #8325: Import Curve-nistk163's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk233 --------------------------
certutil -s "CN=Curve-nistk233, E=Curve-nistk233-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk233 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8326: Generate EC Cert Request for Curve-nistk233 - PASSED
cert.sh: Sign Curve-nistk233's EC Request --------------------------
certutil -C -c TestCA-ec -m 2023 -v 60 -d ../CA -i req -o Curve-nistk233-ec.cert -f ../tests.pw 
cert.sh: #8327: Sign Curve-nistk233's EC Request - PASSED
cert.sh: Import Curve-nistk233's EC Cert --------------------------
certutil -A -n Curve-nistk233-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistk233-ec.cert
cert.sh: #8328: Import Curve-nistk233's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk283 --------------------------
certutil -s "CN=Curve-nistk283, E=Curve-nistk283-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk283 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8329: Generate EC Cert Request for Curve-nistk283 - PASSED
cert.sh: Sign Curve-nistk283's EC Request --------------------------
certutil -C -c TestCA-ec -m 2024 -v 60 -d ../CA -i req -o Curve-nistk283-ec.cert -f ../tests.pw 
cert.sh: #8330: Sign Curve-nistk283's EC Request - PASSED
cert.sh: Import Curve-nistk283's EC Cert --------------------------
certutil -A -n Curve-nistk283-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistk283-ec.cert
cert.sh: #8331: Import Curve-nistk283's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk409 --------------------------
certutil -s "CN=Curve-nistk409, E=Curve-nistk409-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk409 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8332: Generate EC Cert Request for Curve-nistk409 - PASSED
cert.sh: Sign Curve-nistk409's EC Request --------------------------
certutil -C -c TestCA-ec -m 2025 -v 60 -d ../CA -i req -o Curve-nistk409-ec.cert -f ../tests.pw 
cert.sh: #8333: Sign Curve-nistk409's EC Request - PASSED
cert.sh: Import Curve-nistk409's EC Cert --------------------------
certutil -A -n Curve-nistk409-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistk409-ec.cert
cert.sh: #8334: Import Curve-nistk409's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistk571 --------------------------
certutil -s "CN=Curve-nistk571, E=Curve-nistk571-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistk571 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8335: Generate EC Cert Request for Curve-nistk571 - PASSED
cert.sh: Sign Curve-nistk571's EC Request --------------------------
certutil -C -c TestCA-ec -m 2026 -v 60 -d ../CA -i req -o Curve-nistk571-ec.cert -f ../tests.pw 
cert.sh: #8336: Sign Curve-nistk571's EC Request - PASSED
cert.sh: Import Curve-nistk571's EC Cert --------------------------
certutil -A -n Curve-nistk571-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistk571-ec.cert
cert.sh: #8337: Import Curve-nistk571's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp192 --------------------------
certutil -s "CN=Curve-nistp192, E=Curve-nistp192-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp192 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8338: Generate EC Cert Request for Curve-nistp192 - PASSED
cert.sh: Sign Curve-nistp192's EC Request --------------------------
certutil -C -c TestCA-ec -m 2027 -v 60 -d ../CA -i req -o Curve-nistp192-ec.cert -f ../tests.pw 
cert.sh: #8339: Sign Curve-nistp192's EC Request - PASSED
cert.sh: Import Curve-nistp192's EC Cert --------------------------
certutil -A -n Curve-nistp192-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp192-ec.cert
cert.sh: #8340: Import Curve-nistp192's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp224 --------------------------
certutil -s "CN=Curve-nistp224, E=Curve-nistp224-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp224 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8341: Generate EC Cert Request for Curve-nistp224 - PASSED
cert.sh: Sign Curve-nistp224's EC Request --------------------------
certutil -C -c TestCA-ec -m 2028 -v 60 -d ../CA -i req -o Curve-nistp224-ec.cert -f ../tests.pw 
cert.sh: #8342: Sign Curve-nistp224's EC Request - PASSED
cert.sh: Import Curve-nistp224's EC Cert --------------------------
certutil -A -n Curve-nistp224-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp224-ec.cert
cert.sh: #8343: Import Curve-nistp224's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp256 --------------------------
certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8344: Generate EC Cert Request for Curve-nistp256 - PASSED
cert.sh: Sign Curve-nistp256's EC Request --------------------------
certutil -C -c TestCA-ec -m 2029 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw 
cert.sh: #8345: Sign Curve-nistp256's EC Request - PASSED
cert.sh: Import Curve-nistp256's EC Cert --------------------------
certutil -A -n Curve-nistp256-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert
cert.sh: #8346: Import Curve-nistp256's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp384 --------------------------
certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8347: Generate EC Cert Request for Curve-nistp384 - PASSED
cert.sh: Sign Curve-nistp384's EC Request --------------------------
certutil -C -c TestCA-ec -m 2030 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw 
cert.sh: #8348: Sign Curve-nistp384's EC Request - PASSED
cert.sh: Import Curve-nistp384's EC Cert --------------------------
certutil -A -n Curve-nistp384-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert
cert.sh: #8349: Import Curve-nistp384's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp521 --------------------------
certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8350: Generate EC Cert Request for Curve-nistp521 - PASSED
cert.sh: Sign Curve-nistp521's EC Request --------------------------
certutil -C -c TestCA-ec -m 2031 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw 
cert.sh: #8351: Sign Curve-nistp521's EC Request - PASSED
cert.sh: Import Curve-nistp521's EC Cert --------------------------
certutil -A -n Curve-nistp521-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert
cert.sh: #8352: Import Curve-nistp521's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v1 --------------------------
certutil -s "CN=Curve-prime192v1, E=Curve-prime192v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8353: Generate EC Cert Request for Curve-prime192v1 - PASSED
cert.sh: Sign Curve-prime192v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2032 -v 60 -d ../CA -i req -o Curve-prime192v1-ec.cert -f ../tests.pw 
cert.sh: #8354: Sign Curve-prime192v1's EC Request - PASSED
cert.sh: Import Curve-prime192v1's EC Cert --------------------------
certutil -A -n Curve-prime192v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-prime192v1-ec.cert
cert.sh: #8355: Import Curve-prime192v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v2 --------------------------
certutil -s "CN=Curve-prime192v2, E=Curve-prime192v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8356: Generate EC Cert Request for Curve-prime192v2 - PASSED
cert.sh: Sign Curve-prime192v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2033 -v 60 -d ../CA -i req -o Curve-prime192v2-ec.cert -f ../tests.pw 
cert.sh: #8357: Sign Curve-prime192v2's EC Request - PASSED
cert.sh: Import Curve-prime192v2's EC Cert --------------------------
certutil -A -n Curve-prime192v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-prime192v2-ec.cert
cert.sh: #8358: Import Curve-prime192v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime192v3 --------------------------
certutil -s "CN=Curve-prime192v3, E=Curve-prime192v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime192v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8359: Generate EC Cert Request for Curve-prime192v3 - PASSED
cert.sh: Sign Curve-prime192v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2034 -v 60 -d ../CA -i req -o Curve-prime192v3-ec.cert -f ../tests.pw 
cert.sh: #8360: Sign Curve-prime192v3's EC Request - PASSED
cert.sh: Import Curve-prime192v3's EC Cert --------------------------
certutil -A -n Curve-prime192v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-prime192v3-ec.cert
cert.sh: #8361: Import Curve-prime192v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v1 --------------------------
certutil -s "CN=Curve-prime239v1, E=Curve-prime239v1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8362: Generate EC Cert Request for Curve-prime239v1 - PASSED
cert.sh: Sign Curve-prime239v1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2035 -v 60 -d ../CA -i req -o Curve-prime239v1-ec.cert -f ../tests.pw 
cert.sh: #8363: Sign Curve-prime239v1's EC Request - PASSED
cert.sh: Import Curve-prime239v1's EC Cert --------------------------
certutil -A -n Curve-prime239v1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-prime239v1-ec.cert
cert.sh: #8364: Import Curve-prime239v1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v2 --------------------------
certutil -s "CN=Curve-prime239v2, E=Curve-prime239v2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8365: Generate EC Cert Request for Curve-prime239v2 - PASSED
cert.sh: Sign Curve-prime239v2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2036 -v 60 -d ../CA -i req -o Curve-prime239v2-ec.cert -f ../tests.pw 
cert.sh: #8366: Sign Curve-prime239v2's EC Request - PASSED
cert.sh: Import Curve-prime239v2's EC Cert --------------------------
certutil -A -n Curve-prime239v2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-prime239v2-ec.cert
cert.sh: #8367: Import Curve-prime239v2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-prime239v3 --------------------------
certutil -s "CN=Curve-prime239v3, E=Curve-prime239v3-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q prime239v3 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8368: Generate EC Cert Request for Curve-prime239v3 - PASSED
cert.sh: Sign Curve-prime239v3's EC Request --------------------------
certutil -C -c TestCA-ec -m 2037 -v 60 -d ../CA -i req -o Curve-prime239v3-ec.cert -f ../tests.pw 
cert.sh: #8369: Sign Curve-prime239v3's EC Request - PASSED
cert.sh: Import Curve-prime239v3's EC Cert --------------------------
certutil -A -n Curve-prime239v3-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-prime239v3-ec.cert
cert.sh: #8370: Import Curve-prime239v3's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp112r1 --------------------------
certutil -s "CN=Curve-secp112r1, E=Curve-secp112r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8371: Generate EC Cert Request for Curve-secp112r1 - PASSED
cert.sh: Sign Curve-secp112r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2038 -v 60 -d ../CA -i req -o Curve-secp112r1-ec.cert -f ../tests.pw 
cert.sh: #8372: Sign Curve-secp112r1's EC Request - PASSED
cert.sh: Import Curve-secp112r1's EC Cert --------------------------
certutil -A -n Curve-secp112r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp112r1-ec.cert
cert.sh: #8373: Import Curve-secp112r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp112r2 --------------------------
certutil -s "CN=Curve-secp112r2, E=Curve-secp112r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp112r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8374: Generate EC Cert Request for Curve-secp112r2 - PASSED
cert.sh: Sign Curve-secp112r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2039 -v 60 -d ../CA -i req -o Curve-secp112r2-ec.cert -f ../tests.pw 
cert.sh: #8375: Sign Curve-secp112r2's EC Request - PASSED
cert.sh: Import Curve-secp112r2's EC Cert --------------------------
certutil -A -n Curve-secp112r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp112r2-ec.cert
cert.sh: #8376: Import Curve-secp112r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp128r1 --------------------------
certutil -s "CN=Curve-secp128r1, E=Curve-secp128r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8377: Generate EC Cert Request for Curve-secp128r1 - PASSED
cert.sh: Sign Curve-secp128r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2040 -v 60 -d ../CA -i req -o Curve-secp128r1-ec.cert -f ../tests.pw 
cert.sh: #8378: Sign Curve-secp128r1's EC Request - PASSED
cert.sh: Import Curve-secp128r1's EC Cert --------------------------
certutil -A -n Curve-secp128r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp128r1-ec.cert
cert.sh: #8379: Import Curve-secp128r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp128r2 --------------------------
certutil -s "CN=Curve-secp128r2, E=Curve-secp128r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp128r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8380: Generate EC Cert Request for Curve-secp128r2 - PASSED
cert.sh: Sign Curve-secp128r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2041 -v 60 -d ../CA -i req -o Curve-secp128r2-ec.cert -f ../tests.pw 
cert.sh: #8381: Sign Curve-secp128r2's EC Request - PASSED
cert.sh: Import Curve-secp128r2's EC Cert --------------------------
certutil -A -n Curve-secp128r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp128r2-ec.cert
cert.sh: #8382: Import Curve-secp128r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160k1 --------------------------
certutil -s "CN=Curve-secp160k1, E=Curve-secp160k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8383: Generate EC Cert Request for Curve-secp160k1 - PASSED
cert.sh: Sign Curve-secp160k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2042 -v 60 -d ../CA -i req -o Curve-secp160k1-ec.cert -f ../tests.pw 
cert.sh: #8384: Sign Curve-secp160k1's EC Request - PASSED
cert.sh: Import Curve-secp160k1's EC Cert --------------------------
certutil -A -n Curve-secp160k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp160k1-ec.cert
cert.sh: #8385: Import Curve-secp160k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160r1 --------------------------
certutil -s "CN=Curve-secp160r1, E=Curve-secp160r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8386: Generate EC Cert Request for Curve-secp160r1 - PASSED
cert.sh: Sign Curve-secp160r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2043 -v 60 -d ../CA -i req -o Curve-secp160r1-ec.cert -f ../tests.pw 
cert.sh: #8387: Sign Curve-secp160r1's EC Request - PASSED
cert.sh: Import Curve-secp160r1's EC Cert --------------------------
certutil -A -n Curve-secp160r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp160r1-ec.cert
cert.sh: #8388: Import Curve-secp160r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp160r2 --------------------------
certutil -s "CN=Curve-secp160r2, E=Curve-secp160r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp160r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8389: Generate EC Cert Request for Curve-secp160r2 - PASSED
cert.sh: Sign Curve-secp160r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2044 -v 60 -d ../CA -i req -o Curve-secp160r2-ec.cert -f ../tests.pw 
cert.sh: #8390: Sign Curve-secp160r2's EC Request - PASSED
cert.sh: Import Curve-secp160r2's EC Cert --------------------------
certutil -A -n Curve-secp160r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp160r2-ec.cert
cert.sh: #8391: Import Curve-secp160r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp192k1 --------------------------
certutil -s "CN=Curve-secp192k1, E=Curve-secp192k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8392: Generate EC Cert Request for Curve-secp192k1 - PASSED
cert.sh: Sign Curve-secp192k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2045 -v 60 -d ../CA -i req -o Curve-secp192k1-ec.cert -f ../tests.pw 
cert.sh: #8393: Sign Curve-secp192k1's EC Request - PASSED
cert.sh: Import Curve-secp192k1's EC Cert --------------------------
certutil -A -n Curve-secp192k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp192k1-ec.cert
cert.sh: #8394: Import Curve-secp192k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp192r1 --------------------------
certutil -s "CN=Curve-secp192r1, E=Curve-secp192r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp192r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8395: Generate EC Cert Request for Curve-secp192r1 - PASSED
cert.sh: Sign Curve-secp192r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2046 -v 60 -d ../CA -i req -o Curve-secp192r1-ec.cert -f ../tests.pw 
cert.sh: #8396: Sign Curve-secp192r1's EC Request - PASSED
cert.sh: Import Curve-secp192r1's EC Cert --------------------------
certutil -A -n Curve-secp192r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp192r1-ec.cert
cert.sh: #8397: Import Curve-secp192r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp224k1 --------------------------
certutil -s "CN=Curve-secp224k1, E=Curve-secp224k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8398: Generate EC Cert Request for Curve-secp224k1 - PASSED
cert.sh: Sign Curve-secp224k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2047 -v 60 -d ../CA -i req -o Curve-secp224k1-ec.cert -f ../tests.pw 
cert.sh: #8399: Sign Curve-secp224k1's EC Request - PASSED
cert.sh: Import Curve-secp224k1's EC Cert --------------------------
certutil -A -n Curve-secp224k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp224k1-ec.cert
cert.sh: #8400: Import Curve-secp224k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp224r1 --------------------------
certutil -s "CN=Curve-secp224r1, E=Curve-secp224r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp224r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8401: Generate EC Cert Request for Curve-secp224r1 - PASSED
cert.sh: Sign Curve-secp224r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2048 -v 60 -d ../CA -i req -o Curve-secp224r1-ec.cert -f ../tests.pw 
cert.sh: #8402: Sign Curve-secp224r1's EC Request - PASSED
cert.sh: Import Curve-secp224r1's EC Cert --------------------------
certutil -A -n Curve-secp224r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp224r1-ec.cert
cert.sh: #8403: Import Curve-secp224r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp256k1 --------------------------
certutil -s "CN=Curve-secp256k1, E=Curve-secp256k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8404: Generate EC Cert Request for Curve-secp256k1 - PASSED
cert.sh: Sign Curve-secp256k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2049 -v 60 -d ../CA -i req -o Curve-secp256k1-ec.cert -f ../tests.pw 
cert.sh: #8405: Sign Curve-secp256k1's EC Request - PASSED
cert.sh: Import Curve-secp256k1's EC Cert --------------------------
certutil -A -n Curve-secp256k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp256k1-ec.cert
cert.sh: #8406: Import Curve-secp256k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp256r1 --------------------------
certutil -s "CN=Curve-secp256r1, E=Curve-secp256r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp256r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8407: Generate EC Cert Request for Curve-secp256r1 - PASSED
cert.sh: Sign Curve-secp256r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2050 -v 60 -d ../CA -i req -o Curve-secp256r1-ec.cert -f ../tests.pw 
cert.sh: #8408: Sign Curve-secp256r1's EC Request - PASSED
cert.sh: Import Curve-secp256r1's EC Cert --------------------------
certutil -A -n Curve-secp256r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp256r1-ec.cert
cert.sh: #8409: Import Curve-secp256r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp384r1 --------------------------
certutil -s "CN=Curve-secp384r1, E=Curve-secp384r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8410: Generate EC Cert Request for Curve-secp384r1 - PASSED
cert.sh: Sign Curve-secp384r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2051 -v 60 -d ../CA -i req -o Curve-secp384r1-ec.cert -f ../tests.pw 
cert.sh: #8411: Sign Curve-secp384r1's EC Request - PASSED
cert.sh: Import Curve-secp384r1's EC Cert --------------------------
certutil -A -n Curve-secp384r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp384r1-ec.cert
cert.sh: #8412: Import Curve-secp384r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-secp521r1 --------------------------
certutil -s "CN=Curve-secp521r1, E=Curve-secp521r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp521r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8413: Generate EC Cert Request for Curve-secp521r1 - PASSED
cert.sh: Sign Curve-secp521r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2052 -v 60 -d ../CA -i req -o Curve-secp521r1-ec.cert -f ../tests.pw 
cert.sh: #8414: Sign Curve-secp521r1's EC Request - PASSED
cert.sh: Import Curve-secp521r1's EC Cert --------------------------
certutil -A -n Curve-secp521r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-secp521r1-ec.cert
cert.sh: #8415: Import Curve-secp521r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect113r1 --------------------------
certutil -s "CN=Curve-sect113r1, E=Curve-sect113r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8416: Generate EC Cert Request for Curve-sect113r1 - PASSED
cert.sh: Sign Curve-sect113r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2053 -v 60 -d ../CA -i req -o Curve-sect113r1-ec.cert -f ../tests.pw 
cert.sh: #8417: Sign Curve-sect113r1's EC Request - PASSED
cert.sh: Import Curve-sect113r1's EC Cert --------------------------
certutil -A -n Curve-sect113r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect113r1-ec.cert
cert.sh: #8418: Import Curve-sect113r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect113r2 --------------------------
certutil -s "CN=Curve-sect113r2, E=Curve-sect113r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect113r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8419: Generate EC Cert Request for Curve-sect113r2 - PASSED
cert.sh: Sign Curve-sect113r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2054 -v 60 -d ../CA -i req -o Curve-sect113r2-ec.cert -f ../tests.pw 
cert.sh: #8420: Sign Curve-sect113r2's EC Request - PASSED
cert.sh: Import Curve-sect113r2's EC Cert --------------------------
certutil -A -n Curve-sect113r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect113r2-ec.cert
cert.sh: #8421: Import Curve-sect113r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect131r1 --------------------------
certutil -s "CN=Curve-sect131r1, E=Curve-sect131r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8422: Generate EC Cert Request for Curve-sect131r1 - PASSED
cert.sh: Sign Curve-sect131r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2055 -v 60 -d ../CA -i req -o Curve-sect131r1-ec.cert -f ../tests.pw 
cert.sh: #8423: Sign Curve-sect131r1's EC Request - PASSED
cert.sh: Import Curve-sect131r1's EC Cert --------------------------
certutil -A -n Curve-sect131r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect131r1-ec.cert
cert.sh: #8424: Import Curve-sect131r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect131r2 --------------------------
certutil -s "CN=Curve-sect131r2, E=Curve-sect131r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect131r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8425: Generate EC Cert Request for Curve-sect131r2 - PASSED
cert.sh: Sign Curve-sect131r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2056 -v 60 -d ../CA -i req -o Curve-sect131r2-ec.cert -f ../tests.pw 
cert.sh: #8426: Sign Curve-sect131r2's EC Request - PASSED
cert.sh: Import Curve-sect131r2's EC Cert --------------------------
certutil -A -n Curve-sect131r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect131r2-ec.cert
cert.sh: #8427: Import Curve-sect131r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163k1 --------------------------
certutil -s "CN=Curve-sect163k1, E=Curve-sect163k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8428: Generate EC Cert Request for Curve-sect163k1 - PASSED
cert.sh: Sign Curve-sect163k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2057 -v 60 -d ../CA -i req -o Curve-sect163k1-ec.cert -f ../tests.pw 
cert.sh: #8429: Sign Curve-sect163k1's EC Request - PASSED
cert.sh: Import Curve-sect163k1's EC Cert --------------------------
certutil -A -n Curve-sect163k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect163k1-ec.cert
cert.sh: #8430: Import Curve-sect163k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163r1 --------------------------
certutil -s "CN=Curve-sect163r1, E=Curve-sect163r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8431: Generate EC Cert Request for Curve-sect163r1 - PASSED
cert.sh: Sign Curve-sect163r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2058 -v 60 -d ../CA -i req -o Curve-sect163r1-ec.cert -f ../tests.pw 
cert.sh: #8432: Sign Curve-sect163r1's EC Request - PASSED
cert.sh: Import Curve-sect163r1's EC Cert --------------------------
certutil -A -n Curve-sect163r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect163r1-ec.cert
cert.sh: #8433: Import Curve-sect163r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect163r2 --------------------------
certutil -s "CN=Curve-sect163r2, E=Curve-sect163r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect163r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8434: Generate EC Cert Request for Curve-sect163r2 - PASSED
cert.sh: Sign Curve-sect163r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2059 -v 60 -d ../CA -i req -o Curve-sect163r2-ec.cert -f ../tests.pw 
cert.sh: #8435: Sign Curve-sect163r2's EC Request - PASSED
cert.sh: Import Curve-sect163r2's EC Cert --------------------------
certutil -A -n Curve-sect163r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect163r2-ec.cert
cert.sh: #8436: Import Curve-sect163r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect193r1 --------------------------
certutil -s "CN=Curve-sect193r1, E=Curve-sect193r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8437: Generate EC Cert Request for Curve-sect193r1 - PASSED
cert.sh: Sign Curve-sect193r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2060 -v 60 -d ../CA -i req -o Curve-sect193r1-ec.cert -f ../tests.pw 
cert.sh: #8438: Sign Curve-sect193r1's EC Request - PASSED
cert.sh: Import Curve-sect193r1's EC Cert --------------------------
certutil -A -n Curve-sect193r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect193r1-ec.cert
cert.sh: #8439: Import Curve-sect193r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect193r2 --------------------------
certutil -s "CN=Curve-sect193r2, E=Curve-sect193r2-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect193r2 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8440: Generate EC Cert Request for Curve-sect193r2 - PASSED
cert.sh: Sign Curve-sect193r2's EC Request --------------------------
certutil -C -c TestCA-ec -m 2061 -v 60 -d ../CA -i req -o Curve-sect193r2-ec.cert -f ../tests.pw 
cert.sh: #8441: Sign Curve-sect193r2's EC Request - PASSED
cert.sh: Import Curve-sect193r2's EC Cert --------------------------
certutil -A -n Curve-sect193r2-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect193r2-ec.cert
cert.sh: #8442: Import Curve-sect193r2's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect233k1 --------------------------
certutil -s "CN=Curve-sect233k1, E=Curve-sect233k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8443: Generate EC Cert Request for Curve-sect233k1 - PASSED
cert.sh: Sign Curve-sect233k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2062 -v 60 -d ../CA -i req -o Curve-sect233k1-ec.cert -f ../tests.pw 
cert.sh: #8444: Sign Curve-sect233k1's EC Request - PASSED
cert.sh: Import Curve-sect233k1's EC Cert --------------------------
certutil -A -n Curve-sect233k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect233k1-ec.cert
cert.sh: #8445: Import Curve-sect233k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect233r1 --------------------------
certutil -s "CN=Curve-sect233r1, E=Curve-sect233r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect233r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8446: Generate EC Cert Request for Curve-sect233r1 - PASSED
cert.sh: Sign Curve-sect233r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2063 -v 60 -d ../CA -i req -o Curve-sect233r1-ec.cert -f ../tests.pw 
cert.sh: #8447: Sign Curve-sect233r1's EC Request - PASSED
cert.sh: Import Curve-sect233r1's EC Cert --------------------------
certutil -A -n Curve-sect233r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect233r1-ec.cert
cert.sh: #8448: Import Curve-sect233r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect239k1 --------------------------
certutil -s "CN=Curve-sect239k1, E=Curve-sect239k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect239k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8449: Generate EC Cert Request for Curve-sect239k1 - PASSED
cert.sh: Sign Curve-sect239k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2064 -v 60 -d ../CA -i req -o Curve-sect239k1-ec.cert -f ../tests.pw 
cert.sh: #8450: Sign Curve-sect239k1's EC Request - PASSED
cert.sh: Import Curve-sect239k1's EC Cert --------------------------
certutil -A -n Curve-sect239k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect239k1-ec.cert
cert.sh: #8451: Import Curve-sect239k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect283k1 --------------------------
certutil -s "CN=Curve-sect283k1, E=Curve-sect283k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8452: Generate EC Cert Request for Curve-sect283k1 - PASSED
cert.sh: Sign Curve-sect283k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2065 -v 60 -d ../CA -i req -o Curve-sect283k1-ec.cert -f ../tests.pw 
cert.sh: #8453: Sign Curve-sect283k1's EC Request - PASSED
cert.sh: Import Curve-sect283k1's EC Cert --------------------------
certutil -A -n Curve-sect283k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect283k1-ec.cert
cert.sh: #8454: Import Curve-sect283k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect283r1 --------------------------
certutil -s "CN=Curve-sect283r1, E=Curve-sect283r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect283r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8455: Generate EC Cert Request for Curve-sect283r1 - PASSED
cert.sh: Sign Curve-sect283r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2066 -v 60 -d ../CA -i req -o Curve-sect283r1-ec.cert -f ../tests.pw 
cert.sh: #8456: Sign Curve-sect283r1's EC Request - PASSED
cert.sh: Import Curve-sect283r1's EC Cert --------------------------
certutil -A -n Curve-sect283r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect283r1-ec.cert
cert.sh: #8457: Import Curve-sect283r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect409k1 --------------------------
certutil -s "CN=Curve-sect409k1, E=Curve-sect409k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8458: Generate EC Cert Request for Curve-sect409k1 - PASSED
cert.sh: Sign Curve-sect409k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2067 -v 60 -d ../CA -i req -o Curve-sect409k1-ec.cert -f ../tests.pw 
cert.sh: #8459: Sign Curve-sect409k1's EC Request - PASSED
cert.sh: Import Curve-sect409k1's EC Cert --------------------------
certutil -A -n Curve-sect409k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect409k1-ec.cert
cert.sh: #8460: Import Curve-sect409k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect409r1 --------------------------
certutil -s "CN=Curve-sect409r1, E=Curve-sect409r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect409r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8461: Generate EC Cert Request for Curve-sect409r1 - PASSED
cert.sh: Sign Curve-sect409r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2068 -v 60 -d ../CA -i req -o Curve-sect409r1-ec.cert -f ../tests.pw 
cert.sh: #8462: Sign Curve-sect409r1's EC Request - PASSED
cert.sh: Import Curve-sect409r1's EC Cert --------------------------
certutil -A -n Curve-sect409r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect409r1-ec.cert
cert.sh: #8463: Import Curve-sect409r1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect571k1 --------------------------
certutil -s "CN=Curve-sect571k1, E=Curve-sect571k1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571k1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8464: Generate EC Cert Request for Curve-sect571k1 - PASSED
cert.sh: Sign Curve-sect571k1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2069 -v 60 -d ../CA -i req -o Curve-sect571k1-ec.cert -f ../tests.pw 
cert.sh: #8465: Sign Curve-sect571k1's EC Request - PASSED
cert.sh: Import Curve-sect571k1's EC Cert --------------------------
certutil -A -n Curve-sect571k1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect571k1-ec.cert
cert.sh: #8466: Import Curve-sect571k1's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-sect571r1 --------------------------
certutil -s "CN=Curve-sect571r1, E=Curve-sect571r1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q sect571r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8467: Generate EC Cert Request for Curve-sect571r1 - PASSED
cert.sh: Sign Curve-sect571r1's EC Request --------------------------
certutil -C -c TestCA-ec -m 2070 -v 60 -d ../CA -i req -o Curve-sect571r1-ec.cert -f ../tests.pw 
cert.sh: #8468: Sign Curve-sect571r1's EC Request - PASSED
cert.sh: Import Curve-sect571r1's EC Cert --------------------------
certutil -A -n Curve-sect571r1-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/eccurves -f ../tests.pw -i Curve-sect571r1-ec.cert
cert.sh: #8469: Import Curve-sect571r1's EC Cert - PASSED
cert.sh: Initializing TestExt's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -f ../tests.pw
cert.sh: #8470: Initializing TestExt's Cert DB - PASSED
cert.sh: Loading root cert module to TestExt's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8471: Loading root cert module to TestExt's Cert DB - PASSED
cert.sh: Import Root CA for TestExt --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -i ../CA/TestCA.ca.cert
cert.sh: #8472: Import Root CA for TestExt - PASSED
cert.sh: Import EC Root CA for TestExt --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -i ../CA/TestCA-ec.ca.cert
cert.sh: #8473: Import EC Root CA for TestExt - PASSED
cert.sh: Generate Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8474: Generate Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's Request --------------------------
certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw 
cert.sh: #8475: Sign TestExt's Request - PASSED
cert.sh: Import TestExt's Cert --------------------------
certutil -A -n TestExt -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -f ../tests.pw -i TestExt.cert
cert.sh: #8476: Import TestExt's Cert - PASSED
cert.sh SUCCESS: TestExt's Cert Created
cert.sh: Generate EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8477: Generate EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request --------------------------
certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw 
cert.sh: #8478: Sign TestExt's EC Request - PASSED
cert.sh: Import TestExt's EC Cert --------------------------
certutil -A -n TestExt-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-ec.cert
cert.sh: #8479: Import TestExt's EC Cert - PASSED
cert.sh SUCCESS: TestExt's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8480: Generate mixed EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw 
cert.sh: #8481: Sign TestExt's EC Request with RSA - PASSED
cert.sh: Import TestExt's mixed EC Cert --------------------------
certutil -A -n TestExt-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert
cert.sh: #8482: Import TestExt's mixed EC Cert - PASSED
cert.sh SUCCESS: TestExt's mixed EC Cert Created

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -S -n TestExt1 -t u,u,u -o /tmp/cert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
n


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -L -n TestExt1
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:67:7d
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 00:27:40 2012
            Not After : Thu Feb 28 00:27:40 2013
        Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ad:b4:a5:2d:22:09:3c:0a:10:14:00:01:c6:6c:6a:00:
                    0a:66:d0:fd:15:b1:d2:ae:af:cb:c0:4f:4a:24:fc:59:
                    d6:cb:34:11:44:32:2e:83:5a:11:47:c9:8f:52:92:4a:
                    6f:e7:34:30:a2:36:f4:64:c6:fd:db:c8:94:3f:f6:c0:
                    3a:7c:4b:2d:a3:8b:d3:9d:5a:17:8f:ff:ad:24:3f:c7:
                    dc:fd:78:ea:66:0a:6b:0f:31:7c:d1:68:73:bd:89:27:
                    6c:cd:47:0d:93:8a:8a:e7:83:7e:3c:ef:aa:ea:6e:4f:
                    b9:f4:49:5e:10:96:41:1b:84:03:ad:08:45:09:16:77
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Usages: Digital Signature
                    Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1c:fa:39:ab:c6:73:45:be:92:1f:58:98:9a:a5:d4:ce:
        7f:49:8c:80:af:c5:83:49:cc:eb:82:16:b5:f5:bf:79:
        28:42:bb:55:dd:6d:80:a5:de:84:91:9a:2e:ac:26:1f:
        41:01:ab:fc:8d:b4:f4:30:b8:18:0b:21:d4:dd:de:6f:
        06:0f:57:d4:57:0b:e8:67:8e:93:f8:3b:f2:6c:25:75:
        a6:8c:a8:7a:66:dd:a3:7a:41:19:8e:f9:de:8e:f7:55:
        b1:54:0c:65:0d:17:23:8a:c7:20:4a:1c:26:57:ed:56:
        69:a7:50:0f:19:45:f0:0a:ff:ca:ec:1b:20:9d:3a:d8
    Fingerprint (MD5):
        52:2D:71:A9:DC:59:46:47:74:50:EC:E9:04:80:65:DD
    Fingerprint (SHA1):
        19:44:5F:7F:61:45:D8:0D:DC:4B:A7:39:62:5D:50:44:15:04:F2:D9

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8483: Certificate Key Usage Extension (1) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -S -n TestExt2 -t u,u,u -o /tmp/cert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -L -n TestExt2
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:67:80
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 00:27:42 2012
            Not After : Thu Feb 28 00:27:42 2013
        Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:a7:af:06:94:8a:00:15:cf:b3:ff:86:9c:97:07:9d:
                    40:4c:74:33:d4:52:cd:d5:1b:c4:d8:47:e5:2f:cb:12:
                    2f:ac:d2:c2:f0:43:2f:44:11:31:d7:0c:bf:bf:65:76:
                    00:54:23:b4:bd:10:f6:99:46:4e:5b:ab:38:00:96:66:
                    38:b2:f1:ef:27:1c:2e:af:28:f8:ca:1f:fb:e5:1f:54:
                    4f:9a:2f:b4:18:a3:d5:bb:33:08:98:73:3b:12:26:93:
                    2e:c7:30:75:d6:04:8b:99:b1:00:88:72:db:8f:f1:b3:
                    d3:81:78:af:0e:3b:99:2e:7d:3c:82:f6:90:63:36:d7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Critical: True
            Usages: Digital Signature
                    Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        29:d3:26:0a:07:3e:51:4b:6e:21:52:56:8a:00:97:c5:
        c4:30:06:2c:d2:9b:ce:e0:d6:33:94:08:6f:84:d1:e5:
        82:2c:10:b6:34:8c:d7:f6:71:ee:62:43:b3:24:d1:fe:
        7d:62:fc:c5:41:9d:4d:f4:70:8b:e0:6e:e5:cd:c4:9c:
        48:4a:32:9a:a5:73:03:63:0d:46:d9:ed:b7:eb:50:fd:
        e5:52:e9:3c:cd:19:bb:52:16:e7:d9:6d:38:13:07:d2:
        f2:1c:a2:73:70:5d:17:0c:16:98:84:70:f7:47:03:1e:
        b9:64:bd:04:42:41:b6:f3:5b:ee:ec:07:ae:d4:59:14
    Fingerprint (MD5):
        2F:57:B7:31:A8:BB:C8:77:02:00:58:53:49:6D:52:F2
    Fingerprint (SHA1):
        CD:32:7B:8C:44:0C:D5:05:93:8C:32:30:97:59:0E:BC:1C:5F:D0:7E

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8484: Certificate Key Usage Extension (2) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -S -n TestExt3 -t u,u,u -o /tmp/cert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions/test.args
certutil options:
y
-1
n


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -L -n TestExt3
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:67:82
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 00:27:43 2012
            Not After : Thu Feb 28 00:27:43 2013
        Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9a:79:ce:cb:60:9f:a4:83:17:29:42:ac:2f:12:b6:6e:
                    c3:49:0e:01:d1:01:33:e0:fe:f8:94:b2:90:90:96:a4:
                    19:aa:7e:03:6a:6e:fb:a5:3c:16:52:df:6d:df:64:d8:
                    e9:09:a2:2f:36:a0:9d:de:e8:83:6b:96:77:a4:f1:ee:
                    e3:c7:7c:8f:25:8e:5f:db:96:4f:e4:1c:a2:2c:50:a0:
                    07:61:c1:f0:d2:a8:9b:64:81:c3:34:3e:40:37:ce:b6:
                    4c:82:91:df:89:f8:32:80:aa:82:05:f8:20:b5:3f:8b:
                    cf:2a:2b:c5:23:e9:64:01:f5:f7:f6:d6:93:c0:c4:a3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        22:5a:3e:1e:5f:bc:aa:c8:35:3b:75:12:09:d3:c2:16:
        9d:a4:df:d8:22:06:02:74:e0:0d:55:14:bf:96:06:f7:
        99:f3:c0:5a:6a:eb:3e:d8:fd:5f:7a:96:54:ef:a9:f2:
        1b:6c:42:7a:89:cb:ab:ee:19:af:fb:c4:19:5f:cd:b9:
        4c:fe:86:e4:92:8d:ce:bc:46:87:76:2d:5a:ca:72:c1:
        29:0d:2a:0f:8b:b4:85:b9:6b:f2:90:92:f0:38:80:69:
        42:8c:e1:09:48:0e:57:d0:49:8c:61:8f:09:0f:49:78:
        09:8b:92:b9:64:6c:c0:45:9e:77:4f:b3:49:32:02:20
    Fingerprint (MD5):
        EC:51:F5:B5:23:C8:FD:5A:19:31:A8:F8:4B:38:4E:7F
    Fingerprint (SHA1):
        D9:02:43:B2:DD:4E:3A:7F:6E:49:22:BA:84:80:A5:8C:48:AC:E4:15

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8485: Certificate Basic Constraints Extension (3) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -S -n TestExt4 -t u,u,u -o /tmp/cert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions/test.args
certutil options:
n
-1
y


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -L -n TestExt4
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:67:84
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 00:27:44 2012
            Not After : Thu Feb 28 00:27:44 2013
        Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ed:d6:8e:1d:7a:94:e4:4f:b7:1c:f2:cc:ab:c3:15:d8:
                    7d:8d:55:fa:e1:d4:27:e5:71:f5:ad:2b:f6:5d:51:49:
                    e9:fa:35:d2:e9:b4:a3:04:97:dd:3d:ba:82:2c:c5:4d:
                    ee:eb:8b:06:67:70:46:cf:1f:2c:df:25:78:c3:1c:db:
                    0b:75:e1:50:3d:a2:77:fe:c2:28:3b:22:f6:57:b9:60:
                    df:a8:2a:cb:5f:65:e5:a4:17:bb:0f:59:24:e0:ed:af:
                    82:4c:52:a8:5c:08:6f:90:f3:92:ef:15:01:27:61:29:
                    3a:59:98:33:76:4f:3f:9a:7b:cb:1b:8a:fe:ff:22:27
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is not a CA.

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        07:1f:5c:5b:3a:49:70:13:73:58:37:94:6b:9a:58:37:
        a3:05:5d:10:ee:d8:47:c3:9b:30:e4:24:50:44:66:37:
        04:1c:46:81:89:20:06:ae:ab:20:0e:00:49:2c:17:9f:
        00:4b:cc:9a:74:57:cd:ad:8a:4f:71:9a:6f:fc:bd:12:
        3d:d0:4d:28:e0:12:ca:16:94:e4:82:91:f7:22:77:4d:
        72:7e:79:ae:81:af:47:12:25:78:9b:73:8f:99:c3:86:
        85:53:28:69:78:47:7e:e5:fe:9d:a9:77:fe:95:d0:98:
        2f:87:eb:45:af:5a:72:65:0a:32:0f:98:45:1e:69:87
    Fingerprint (MD5):
        3B:7A:FE:AE:CC:47:48:9B:38:E7:70:CE:86:12:73:82
    Fingerprint (SHA1):
        2D:6D:8A:DC:08:4B:AF:4E:1F:32:27:4F:73:20:12:3C:CA:31:84:68

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8486: Certificate Basic Constraints Extension (4) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -S -n TestExt5 -t u,u,u -o /tmp/cert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions/test.args
certutil options:
y
12341235123


y


Generating key.  This may take a few moments...

Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -L -n TestExt5
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:67:87
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 00:27:46 2012
            Not After : Thu Feb 28 00:27:46 2013
        Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cd:a9:2d:f1:4b:44:9d:7c:fd:ec:f2:3d:9b:21:2b:4c:
                    fd:a0:c7:8d:92:02:6f:e8:f2:9a:37:1a:95:6a:8d:fc:
                    64:4f:37:6f:f6:9b:59:b9:6e:0d:b9:bf:1a:84:02:ee:
                    c8:17:3d:03:2a:10:72:cf:f1:c7:06:5c:1f:83:5f:c0:
                    ac:60:ad:51:f9:51:81:70:40:70:1d:89:6f:11:d3:94:
                    44:78:77:a4:3d:3f:f8:09:37:f3:d1:ac:80:2b:49:50:
                    f9:59:3f:43:95:36:88:aa:a2:8b:82:35:77:4d:52:78:
                    a0:05:37:68:c0:b7:ef:c0:f7:74:2c:7a:e2:d4:86:f5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Critical: True
            Key ID:
                12341235123

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        11:6a:d2:12:09:73:17:9b:5d:e5:a8:5f:7c:5e:85:49:
        28:b2:ee:a2:ac:fe:b4:61:33:73:8c:26:73:52:23:74:
        4c:43:d7:de:30:04:aa:c3:8f:25:b6:38:ec:56:01:aa:
        f1:86:34:fb:4d:ea:37:8c:d1:75:fc:4b:b2:db:68:e6:
        dd:df:d3:69:d6:c8:81:cf:b7:78:e4:3c:3d:80:b1:8a:
        37:1d:9a:44:cd:2e:83:84:b9:64:40:ec:78:45:5c:84:
        b2:b4:d2:b7:c3:56:8e:7d:0e:0f:70:cd:9e:bb:e6:39:
        f7:7a:28:1c:cd:ed:f5:03:d3:c4:18:f8:fc:31:a6:69
    Fingerprint (MD5):
        2D:CF:8F:3F:0A:E3:6D:75:31:0A:93:3C:A2:AB:40:53
    Fingerprint (SHA1):
        64:02:34:AF:5C:70:CE:59:5A:50:96:F8:D7:B4:8E:82:F4:D5:F0:43

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8487: Certificate Authority Key Identifier Extension (5) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -S -n TestExt6 -t u,u,u -o /tmp/cert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions/test.args
certutil options:
y

3
test.com

214123
y


Generating key.  This may take a few moments...

Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -L -n TestExt6
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:67:8a
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 00:27:47 2012
            Not After : Thu Feb 28 00:27:47 2013
        Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9a:56:3d:65:a0:44:ea:61:f7:7a:69:35:05:f3:f4:15:
                    9f:a2:6d:93:b6:a3:48:a5:db:dc:31:69:20:cf:32:fb:
                    29:a6:17:3f:3f:47:19:a7:07:c8:3e:fe:84:f1:d1:87:
                    f7:75:9b:5c:68:5e:cb:0e:e0:8c:55:b5:1e:e8:28:58:
                    ad:7d:87:8f:95:89:07:74:41:95:b7:b9:d3:a5:4c:19:
                    d9:51:fb:21:a8:29:5b:92:f1:4d:82:87:31:98:da:a0:
                    af:4a:1e:e4:96:a8:88:92:eb:92:1d:21:25:e6:64:67:
                    09:ab:6b:35:99:f2:98:81:e8:9a:71:c5:60:81:1f:43
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Authority Key Identifier
            Critical: True
            Issuer: 
                DNS name: "test.com"
            Serial Number:
                214123

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5d:c3:4f:aa:6b:a4:2c:63:e5:9d:55:18:4c:c6:eb:79:
        6e:53:03:22:84:a5:1f:05:f3:de:6f:5f:82:c2:34:e2:
        11:2b:bd:ef:5d:86:16:0e:5e:ac:6a:98:8b:c5:57:71:
        72:a5:4f:45:33:f2:1a:ec:ef:20:7e:ce:d9:2b:f1:df:
        a8:c9:56:91:54:cc:0f:62:f8:5e:aa:c7:00:5a:87:99:
        00:b8:10:5e:a8:5a:7b:9d:3b:8b:94:b5:d9:83:86:ca:
        ef:98:e4:5a:24:ac:6a:09:5f:a8:d2:d5:61:12:03:d1:
        94:78:7e:97:26:ed:ab:d2:a8:ee:92:b2:6f:f6:22:9d
    Fingerprint (MD5):
        70:44:4B:28:88:9E:D2:50:1A:FF:2D:2A:02:6E:18:0E
    Fingerprint (SHA1):
        B7:8F:47:F9:C7:52:A2:61:C4:70:E9:39:73:FE:F8:62:6B:F5:D5:6A

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8488: Certificate Authority Key Identifier Extension (6) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -S -n TestExt7 -t u,u,u -o /tmp/cert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions/test.args
certutil options:
1
2
rfc822@name.tld
3
test.com
8
1.2.3.4
9
OID.0.2.213
10
0
10
n
n


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -L -n TestExt7
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:67:8c
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 00:27:48 2012
            Not After : Thu Feb 28 00:27:48 2013
        Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c8:4f:70:9e:cd:ed:b1:a6:3b:72:bb:7a:31:22:aa:d4:
                    bd:0a:85:e0:26:96:03:db:0d:a7:80:c5:4f:81:ef:2b:
                    e8:4d:59:d6:b8:69:ff:dd:13:77:87:d8:0b:6f:49:23:
                    42:22:8f:41:88:7f:93:04:a5:d4:2b:b5:42:d1:17:42:
                    69:e4:58:56:e5:b2:c9:15:03:8d:06:e7:38:37:a2:1c:
                    7f:31:63:00:8a:08:70:63:33:ea:04:b5:76:a5:b9:61:
                    c7:f6:94:af:50:df:8c:3f:72:ea:1e:6b:3f:12:3a:60:
                    a2:23:54:a3:7a:28:21:72:1d:83:7e:ed:0b:6b:41:29
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: CRL Distribution Points
            Distribution point:
                RFC822 Name: "rfc822@name.tld"
                DNS name: "test.com"
                IP Address:
                    87:07:31:2e:32:2e:33:2e:34
                Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51
                Reasons:
                    80
                    (7 least significant bits unused)

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        0e:a6:3f:b4:de:87:d3:66:21:04:f5:ed:0e:2c:77:a0:
        8c:7d:d6:31:b2:80:a1:7e:33:06:14:f7:79:fb:a2:64:
        09:a6:cf:89:7b:c9:28:3a:b7:aa:c6:1e:79:ac:8e:66:
        9d:a3:fb:df:ec:b9:d0:07:42:1d:94:89:ab:bc:9d:63:
        65:e2:8a:37:c8:58:1e:41:04:30:07:5b:60:9b:29:63:
        95:7c:c7:3d:9e:a5:2e:bd:c4:46:d1:a7:ea:67:20:17:
        22:1a:6f:4b:be:7b:0a:c2:d9:1c:d1:fd:d2:f1:f3:f9:
        d3:df:1f:a1:ab:65:52:d5:a1:09:02:f8:30:67:d3:43
    Fingerprint (MD5):
        B2:AC:C0:D6:91:8C:4D:46:74:8E:AF:EA:AC:1A:83:2C
    Fingerprint (SHA1):
        B3:E3:A6:84:2F:89:51:B9:03:7C:66:DD:7A:A4:89:35:AA:33:F5:13

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8489: CRL Distribution Points Extension (7) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -S -n TestExt8 -t u,u,u -o /tmp/cert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions/test.args
certutil options:
2
SN=asdfsdf
4
3
test.com
10
n
n


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > Enter the relative name: 

Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -L -n TestExt8
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:67:8f
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 00:27:50 2012
            Not After : Thu Feb 28 00:27:50 2013
        Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e3:fe:24:15:37:7a:06:c9:50:be:37:f7:c6:83:e1:96:
                    d4:35:9c:f4:8a:c2:f1:0c:fd:34:97:92:7b:e5:e6:08:
                    70:01:ce:8c:f9:f0:da:be:39:cf:a8:f1:27:74:e3:4e:
                    8e:3c:bf:df:ee:d9:6d:c9:55:d1:2a:2c:0a:f9:94:65:
                    58:5c:a7:ca:59:e8:c0:17:76:40:8b:c2:3d:64:1e:90:
                    68:c9:0c:c1:cb:6c:8d:af:42:41:74:fb:2b:6c:c9:34:
                    a6:26:72:e3:4a:44:d8:95:41:a0:cb:97:14:e5:62:af:
                    31:a1:ae:d6:90:a3:4a:68:57:27:3a:19:7a:93:69:0f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: CRL Distribution Points
            Distribution point:
                RDN: "SN=asdfsdf"
                Reasons:
                    08
                    (7 least significant bits unused)
                CRL issuer: 
                    DNS name: "test.com"

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9a:09:36:6f:74:7d:c0:a5:93:3d:61:4f:7b:e0:1a:51:
        e6:59:7b:d9:2d:4e:30:2a:f8:19:f7:62:7c:49:8c:9d:
        25:2b:31:98:53:28:ca:e3:23:7f:ec:87:6b:c0:c0:aa:
        c0:77:5f:a3:ae:ed:46:89:25:37:f9:d9:cf:36:9d:a1:
        61:c7:80:b2:d1:bb:e3:50:72:2d:8a:f6:dc:70:5c:66:
        be:f2:6e:ed:42:dc:1a:b2:e3:d0:73:c4:4f:57:49:72:
        80:75:c0:ac:ba:7c:1b:6d:fa:28:da:9f:cc:71:92:e5:
        8c:4a:5b:e7:bb:c2:9c:1b:1f:cd:a2:f0:08:d5:22:77
    Fingerprint (MD5):
        75:BD:11:E2:C3:83:4B:59:99:34:C0:19:1E:85:C2:D0
    Fingerprint (SHA1):
        49:44:DF:6D:DA:0A:09:73:C8:4A:9D:A2:B1:6C:56:E7:57:D9:1E:26

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8490: CRL Distribution Points Extension (8) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -S -n TestExt9 -t u,u,u -o /tmp/cert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions/test.args
certutil options:
0
1
2
10
n


Generating key.  This may take a few moments...

0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -L -n TestExt9
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:67:92
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View
            ,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 00:27:51 2012
            Not After : Thu Feb 28 00:27:51 2013
        Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie
            w,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e3:28:72:26:15:cf:d5:39:e1:2e:97:11:7f:b1:42:b8:
                    58:1a:9b:e6:e6:83:b2:ad:b1:0e:4d:aa:78:0a:3f:ad:
                    8a:94:c8:35:ee:d3:0e:62:3d:6e:db:dc:1d:a4:e0:0e:
                    31:61:59:50:b1:89:28:0c:08:ac:07:62:06:6b:bb:45:
                    ff:0a:32:9b:8b:5a:6e:12:67:ad:ce:2a:58:82:f9:df:
                    5b:64:af:1d:c4:3b:50:64:26:6c:fd:1b:96:e0:1a:a8:
                    b0:d0:e2:bc:e3:0d:83:a3:b4:52:95:83:db:15:d9:91:
                    36:60:03:30:48:0b:80:66:4e:8e:c0:f8:e3:c6:af:29
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL Client,SSL Server,S/MIME>

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        c9:8f:82:b2:7b:02:9a:b9:5d:63:1c:01:f7:af:b9:29:
        ab:66:61:63:f3:47:d4:50:44:12:ce:e7:80:74:27:48:
        47:9a:90:eb:36:c0:79:f3:77:4f:d3:09:57:8d:e2:99:
        0f:5b:19:c8:f9:b0:fa:14:97:9d:81:c1:07:67:27:6e:
        0b:cf:78:1b:89:44:b6:7e:ac:82:06:91:f1:7f:7b:ed:
        f4:a8:4e:bd:17:a4:42:91:3e:93:3d:06:04:7c:fd:a6:
        5c:5f:ac:2a:93:93:d7:14:31:8f:97:f8:92:8a:64:99:
        3b:4f:81:75:02:47:48:ed:75:f5:79:96:be:17:00:07
    Fingerprint (MD5):
        45:8D:EF:1C:8E:4C:E5:97:92:BB:F3:4D:64:73:92:49
    Fingerprint (SHA1):
        D7:40:FB:C1:33:56:97:19:2D:DB:8F:6D:F8:B3:90:99:E8:D7:06:C5

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8491: Certificate Type Extension (9) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -S -n TestExt10 -t u,u,u -o /tmp/cert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y


Generating key.  This may take a few moments...

0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -L -n TestExt10
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:67:94
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi
            ew,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 00:27:52 2012
            Not After : Thu Feb 28 00:27:52 2013
        Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V
            iew,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ac:ca:85:99:bf:d3:50:2a:d1:7a:64:27:d6:18:1f:37:
                    a3:8d:3d:70:26:71:0d:a9:7e:75:df:15:06:6b:ed:30:
                    93:4a:58:68:bb:27:bd:e8:c6:e5:8a:6b:b2:36:7f:31:
                    38:a4:d8:54:fe:9f:4c:24:7c:8f:37:a4:b6:1f:90:9d:
                    01:73:ac:4b:9c:71:85:d9:e0:06:c9:d1:20:64:31:21:
                    a4:9b:1c:d6:0b:6f:1f:db:b9:56:a5:46:3f:ae:f0:b7:
                    ee:32:c5:01:a7:54:aa:3c:18:0c:0b:c5:1b:b7:01:35:
                    e5:a8:7b:23:37:f6:97:8d:9b:84:e7:92:92:0f:4d:5b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Extended Key Usage
            Critical: True
                TLS Web Server Authentication Certificate
                TLS Web Client Authentication Certificate
                Code Signing Certificate
                E-Mail Protection Certificate
                Time Stamping Certifcate
                OCSP Responder Certificate
                Strong Crypto Export Approved

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        6d:44:f2:f7:a3:e1:95:f2:39:98:f2:8a:61:50:c0:d4:
        1f:d5:bc:d7:4c:65:d3:59:48:82:7f:bd:c0:09:90:5f:
        10:c2:18:b2:d2:b6:35:98:b3:cc:82:c3:dd:4e:9f:04:
        2f:a1:99:a6:f4:67:28:78:51:91:e6:84:42:34:90:30:
        a2:e5:7e:bc:9e:e1:b1:1a:1e:ee:a5:e8:b6:33:fa:a2:
        a4:33:b3:66:a4:b7:e9:b7:47:0c:61:39:84:80:93:5c:
        6f:40:ac:f8:66:11:20:1f:d8:01:ac:29:96:53:b2:f9:
        21:0c:25:4b:f9:35:78:70:43:79:0b:cb:e2:32:47:aa
    Fingerprint (MD5):
        E5:DD:2C:6B:12:07:E0:77:D9:0F:AA:43:D0:8E:84:96
    Fingerprint (SHA1):
        63:63:CD:53:D1:1A:6E:50:D2:A2:0C:FB:AB:7D:C5:DE:B4:86:02:4A

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8492: Extended Key Usage Extension (10) - PASSED

certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -S -n TestExt11 -t u,u,u -o /tmp/cert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions/test.args
certutil options:

1
2
3
4
5
6
10
n


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
certutil -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cert_extensions -L -n TestExt11
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            00:99:f0:67:96
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi
            ew,ST=California,C=US"
        Validity:
            Not Before: Wed Nov 28 00:27:53 2012
            Not After : Thu Feb 28 00:27:53 2013
        Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V
            iew,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    da:f8:2c:ad:54:fd:41:cb:51:6e:6c:a0:99:d9:4f:16:
                    aa:6c:8a:75:86:fb:54:7f:22:4d:bd:61:24:22:00:53:
                    34:f9:76:b2:2e:25:eb:ea:de:00:b6:83:8e:ec:32:e6:
                    2e:17:6e:c9:44:21:81:0d:f7:ab:27:54:c9:4e:a2:4d:
                    99:a3:e9:e6:10:f4:4e:09:d0:64:6a:ae:c4:9f:f4:09:
                    cc:3b:8d:c4:a2:0f:1d:c3:2d:1c:ae:f6:92:5a:a2:5a:
                    74:80:0d:9e:c8:2a:53:37:11:d5:16:4d:af:6c:f9:af:
                    03:1c:c4:a5:df:e4:71:3a:0e:29:a8:df:0e:0f:ea:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Key Usage
            Usages: Non-Repudiation
                    Key Encipherment
                    Data Encipherment
                    Key Agreement
                    Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        13:10:5a:b1:b4:8a:92:54:2d:e3:b9:1c:e6:3c:ea:1e:
        c8:1b:aa:37:3c:1f:52:a8:16:3e:67:8a:83:3a:6b:df:
        e8:0f:f0:23:66:4a:87:4e:4d:ba:cf:ff:0d:97:5c:dc:
        5a:0b:50:77:42:65:d7:08:72:d4:ca:99:94:03:6b:60:
        33:fa:eb:e1:3e:e8:6e:23:71:a7:ac:81:09:96:d0:5e:
        b3:d9:61:e7:34:0d:27:f0:9f:f0:69:11:62:65:af:27:
        0d:1d:10:cc:f3:41:41:7a:21:cc:c8:e8:d2:e5:5b:da:
        7f:d3:7d:68:47:09:6d:2d:05:80:8f:82:1b:b5:c6:62
    Fingerprint (MD5):
        B7:27:8A:B1:A2:8F:1F:7E:FF:C7:76:40:46:42:75:15
    Fingerprint (SHA1):
        F7:1A:83:47:18:AE:08:8B:47:04:06:92:41:CD:75:FA:87:CD:F8:45

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User
cert.sh: #8493: Certificate Key Usage Extension (11) - PASSED
cert.sh: Create A Password Test Cert  ==============
cert.sh: Create A Password Test Ca  --------
cert.sh: Creating a CA Certificate PasswordCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/dbpass
cert.sh: Creating CA Cert DB --------------------------
certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/dbpass -f ../tests.pw
cert.sh: #8494: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/dbpass

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8495: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert PasswordCA  --------------------------
certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8496: Creating CA Cert PasswordCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n PasswordCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/dbpass -o root.cert
cert.sh: #8497: Exporting Root Cert - PASSED
cert.sh: Changing password on Password Test Cert's Cert DB --------------------------
certutil -W -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/dbpass -f ../tests.pw -@ ../tests.fipspw
Password changed successfully.
cert.sh: #8498: Changing password on Password Test Cert's Cert DB - PASSED
cert.sh: Generate Certificate for Password Test Cert with new password --------------------------
certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/dbpass -f ../tests.fipspw -z ../tests_noise


Generating key.  This may take a few moments...

cert.sh: #8499: Generate Certificate for Password Test Cert with new password - PASSED
cert.sh SUCCESS: PASSWORD passed
cert.sh: Verify Certificate for Password Test Cert with new password --------------------------
certutil -V -n PasswordCert -u S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/dbpass -f ../tests.fipspw
certutil: certificate is valid
cert.sh: #8500: Verify Certificate for Password Test Cert with new password - PASSED
cert.sh: Creating Distrusted Certificate
cert.sh: Initializing Distrusted's Cert DB --------------------------
certutil -N -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
cert.sh: #8501: Initializing Distrusted's Cert DB - PASSED
cert.sh: Loading root cert module to Distrusted's Cert DB --------------------------
modutil -add RootCerts -libfile /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so -dbdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type 
'q <enter>' to abort, or <enter> to continue: 
Module "RootCerts" added to database.
cert.sh: #8502: Loading root cert module to Distrusted's Cert DB - PASSED
cert.sh: Import Root CA for Distrusted --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -i ../CA/TestCA.ca.cert
cert.sh: #8503: Import Root CA for Distrusted - PASSED
cert.sh: Import EC Root CA for Distrusted --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -i ../CA/TestCA-ec.ca.cert
cert.sh: #8504: Import EC Root CA for Distrusted - PASSED
cert.sh: Generate Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8505: Generate Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's Request --------------------------
certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw 
cert.sh: #8506: Sign Distrusted's Request - PASSED
cert.sh: Import Distrusted's Cert --------------------------
certutil -A -n Distrusted -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw -i Distrusted.cert
cert.sh: #8507: Import Distrusted's Cert - PASSED
cert.sh SUCCESS: Distrusted's Cert Created
cert.sh: Generate EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8508: Generate EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request --------------------------
certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw 
cert.sh: #8509: Sign Distrusted's EC Request - PASSED
cert.sh: Import Distrusted's EC Cert --------------------------
certutil -A -n Distrusted-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw -i Distrusted-ec.cert
cert.sh: #8510: Import Distrusted's EC Cert - PASSED
cert.sh SUCCESS: Distrusted's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8511: Generate mixed EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request with RSA --------------------------
certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw 
cert.sh: #8512: Sign Distrusted's EC Request with RSA - PASSED
cert.sh: Import Distrusted's mixed EC Cert --------------------------
certutil -A -n Distrusted-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw -i Distrusted-ecmixed.cert
cert.sh: #8513: Import Distrusted's mixed EC Cert - PASSED
cert.sh SUCCESS: Distrusted's mixed EC Cert Created
cert.sh: Mark CERT as unstrusted --------------------------
certutil -M -n Distrusted -t p,p,p -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
cert.sh: #8514: Mark CERT as unstrusted - PASSED
cert.sh: Creating Distrusted Intermediate
cert.sh: Creating a CA Certificate DistrustedCA ==========================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/CA
cert.sh: Creating CA Cert DistrustedCA  --------------------------
certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
cert.sh: #8515: Creating CA Cert DistrustedCA  - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n DistrustedCA -r -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/CA -o root.cert
cert.sh: #8516: Exporting Root Cert - PASSED
cert.sh: Import Distrusted Intermediate --------------------------
certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -i ../CA/DistrustedCA.ca.cert
cert.sh: #8517: Import Distrusted Intermediate - PASSED
cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA --------------------------
certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8518: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED
cp: `./req' and `/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/CA/req' are the same file
cert.sh: Sign LeafChainedToDistrustedCA's Request --------------------------
certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw
cert.sh: #8519: Sign LeafChainedToDistrustedCA's Request - PASSED
cert.sh: Import LeafChainedToDistrustedCA's Cert  -t u,u,u --------------------------
certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert
cert.sh: #8520: Import LeafChainedToDistrustedCA's Cert  -t u,u,u - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server --------------------------
certutil -V -n LeafChainedToDistrustedCA -u V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #8521: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client --------------------------
certutil -V -n LeafChainedToDistrustedCA -u C -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #8522: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #8523: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient --------------------------
certutil -V -n LeafChainedToDistrustedCA -u R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #8524: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder --------------------------
certutil -V -n LeafChainedToDistrustedCA -u O -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #8525: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u J -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #8526: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED
cert.sh: Verify Distrusted Cert for SSL Server --------------------------
certutil -V -n Distrusted -u V -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #8527: Verify Distrusted Cert for SSL Server - PASSED
cert.sh: Verify Distrusted Cert for SSL Client --------------------------
certutil -V -n Distrusted -u C -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #8528: Verify Distrusted Cert for SSL Client - PASSED
cert.sh: Verify Distrusted Cert for Email signer --------------------------
certutil -V -n Distrusted -u S -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #8529: Verify Distrusted Cert for Email signer - PASSED
cert.sh: Verify Distrusted Cert for Email recipient --------------------------
certutil -V -n Distrusted -u R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #8530: Verify Distrusted Cert for Email recipient - PASSED
cert.sh: Verify Distrusted Cert for OCSP responder --------------------------
certutil -V -n Distrusted -u O -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #8531: Verify Distrusted Cert for OCSP responder - PASSED
cert.sh: Verify Distrusted Cert for Object Signer --------------------------
certutil -V -n Distrusted -u J -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #8532: Verify Distrusted Cert for Object Signer - PASSED
cert.sh: OCSP response creation selftest
cert.sh: perform selftest --------------------------
ocspresp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/serverCA serverCA chain-1-serverCA -f ../tests.pw
cert.sh: #8533: perform selftest - PASSED
cert.sh: Creating Client CA Issued Certificates Range 40 - 52 ===
cert.sh: Generate Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8534: Generate Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw 
cert.sh: #8535: Sign TestUser40's Request - PASSED
cert.sh: Import TestUser40's Cert --------------------------
certutil -A -n TestUser40 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser40.cert
cert.sh: #8536: Import TestUser40's Cert - PASSED
cert.sh SUCCESS: TestUser40's Cert Created
cert.sh: Generate EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8537: Generate EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw 
cert.sh: #8538: Sign TestUser40's EC Request - PASSED
cert.sh: Import TestUser40's EC Cert --------------------------
certutil -A -n TestUser40-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser40-ec.cert
cert.sh: #8539: Import TestUser40's EC Cert - PASSED
cert.sh SUCCESS: TestUser40's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8540: Generate mixed EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw 
cert.sh: #8541: Sign TestUser40's EC Request with RSA - PASSED
cert.sh: Import TestUser40's mixed EC Cert --------------------------
certutil -A -n TestUser40-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser40-ecmixed.cert
cert.sh: #8542: Import TestUser40's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser40's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8543: Generate Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's Request --------------------------
certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw 
cert.sh: #8544: Sign TestUser41's Request - PASSED
cert.sh: Import TestUser41's Cert --------------------------
certutil -A -n TestUser41 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser41.cert
cert.sh: #8545: Import TestUser41's Cert - PASSED
cert.sh SUCCESS: TestUser41's Cert Created
cert.sh: Generate EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8546: Generate EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request --------------------------
certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw 
cert.sh: #8547: Sign TestUser41's EC Request - PASSED
cert.sh: Import TestUser41's EC Cert --------------------------
certutil -A -n TestUser41-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser41-ec.cert
cert.sh: #8548: Import TestUser41's EC Cert - PASSED
cert.sh SUCCESS: TestUser41's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8549: Generate mixed EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw 
cert.sh: #8550: Sign TestUser41's EC Request with RSA - PASSED
cert.sh: Import TestUser41's mixed EC Cert --------------------------
certutil -A -n TestUser41-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser41-ecmixed.cert
cert.sh: #8551: Import TestUser41's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser41's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8552: Generate Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's Request --------------------------
certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw 
cert.sh: #8553: Sign TestUser42's Request - PASSED
cert.sh: Import TestUser42's Cert --------------------------
certutil -A -n TestUser42 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser42.cert
cert.sh: #8554: Import TestUser42's Cert - PASSED
cert.sh SUCCESS: TestUser42's Cert Created
cert.sh: Generate EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8555: Generate EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request --------------------------
certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw 
cert.sh: #8556: Sign TestUser42's EC Request - PASSED
cert.sh: Import TestUser42's EC Cert --------------------------
certutil -A -n TestUser42-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser42-ec.cert
cert.sh: #8557: Import TestUser42's EC Cert - PASSED
cert.sh SUCCESS: TestUser42's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8558: Generate mixed EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw 
cert.sh: #8559: Sign TestUser42's EC Request with RSA - PASSED
cert.sh: Import TestUser42's mixed EC Cert --------------------------
certutil -A -n TestUser42-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser42-ecmixed.cert
cert.sh: #8560: Import TestUser42's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser42's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8561: Generate Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's Request --------------------------
certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw 
cert.sh: #8562: Sign TestUser43's Request - PASSED
cert.sh: Import TestUser43's Cert --------------------------
certutil -A -n TestUser43 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser43.cert
cert.sh: #8563: Import TestUser43's Cert - PASSED
cert.sh SUCCESS: TestUser43's Cert Created
cert.sh: Generate EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8564: Generate EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request --------------------------
certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw 
cert.sh: #8565: Sign TestUser43's EC Request - PASSED
cert.sh: Import TestUser43's EC Cert --------------------------
certutil -A -n TestUser43-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser43-ec.cert
cert.sh: #8566: Import TestUser43's EC Cert - PASSED
cert.sh SUCCESS: TestUser43's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8567: Generate mixed EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw 
cert.sh: #8568: Sign TestUser43's EC Request with RSA - PASSED
cert.sh: Import TestUser43's mixed EC Cert --------------------------
certutil -A -n TestUser43-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser43-ecmixed.cert
cert.sh: #8569: Import TestUser43's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser43's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8570: Generate Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's Request --------------------------
certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw 
cert.sh: #8571: Sign TestUser44's Request - PASSED
cert.sh: Import TestUser44's Cert --------------------------
certutil -A -n TestUser44 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser44.cert
cert.sh: #8572: Import TestUser44's Cert - PASSED
cert.sh SUCCESS: TestUser44's Cert Created
cert.sh: Generate EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8573: Generate EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request --------------------------
certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw 
cert.sh: #8574: Sign TestUser44's EC Request - PASSED
cert.sh: Import TestUser44's EC Cert --------------------------
certutil -A -n TestUser44-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser44-ec.cert
cert.sh: #8575: Import TestUser44's EC Cert - PASSED
cert.sh SUCCESS: TestUser44's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8576: Generate mixed EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw 
cert.sh: #8577: Sign TestUser44's EC Request with RSA - PASSED
cert.sh: Import TestUser44's mixed EC Cert --------------------------
certutil -A -n TestUser44-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser44-ecmixed.cert
cert.sh: #8578: Import TestUser44's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser44's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8579: Generate Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's Request --------------------------
certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw 
cert.sh: #8580: Sign TestUser45's Request - PASSED
cert.sh: Import TestUser45's Cert --------------------------
certutil -A -n TestUser45 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser45.cert
cert.sh: #8581: Import TestUser45's Cert - PASSED
cert.sh SUCCESS: TestUser45's Cert Created
cert.sh: Generate EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8582: Generate EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request --------------------------
certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw 
cert.sh: #8583: Sign TestUser45's EC Request - PASSED
cert.sh: Import TestUser45's EC Cert --------------------------
certutil -A -n TestUser45-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser45-ec.cert
cert.sh: #8584: Import TestUser45's EC Cert - PASSED
cert.sh SUCCESS: TestUser45's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8585: Generate mixed EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw 
cert.sh: #8586: Sign TestUser45's EC Request with RSA - PASSED
cert.sh: Import TestUser45's mixed EC Cert --------------------------
certutil -A -n TestUser45-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser45-ecmixed.cert
cert.sh: #8587: Import TestUser45's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser45's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8588: Generate Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's Request --------------------------
certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw 
cert.sh: #8589: Sign TestUser46's Request - PASSED
cert.sh: Import TestUser46's Cert --------------------------
certutil -A -n TestUser46 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser46.cert
cert.sh: #8590: Import TestUser46's Cert - PASSED
cert.sh SUCCESS: TestUser46's Cert Created
cert.sh: Generate EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8591: Generate EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request --------------------------
certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw 
cert.sh: #8592: Sign TestUser46's EC Request - PASSED
cert.sh: Import TestUser46's EC Cert --------------------------
certutil -A -n TestUser46-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser46-ec.cert
cert.sh: #8593: Import TestUser46's EC Cert - PASSED
cert.sh SUCCESS: TestUser46's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8594: Generate mixed EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw 
cert.sh: #8595: Sign TestUser46's EC Request with RSA - PASSED
cert.sh: Import TestUser46's mixed EC Cert --------------------------
certutil -A -n TestUser46-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser46-ecmixed.cert
cert.sh: #8596: Import TestUser46's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser46's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8597: Generate Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's Request --------------------------
certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw 
cert.sh: #8598: Sign TestUser47's Request - PASSED
cert.sh: Import TestUser47's Cert --------------------------
certutil -A -n TestUser47 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser47.cert
cert.sh: #8599: Import TestUser47's Cert - PASSED
cert.sh SUCCESS: TestUser47's Cert Created
cert.sh: Generate EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8600: Generate EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request --------------------------
certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw 
cert.sh: #8601: Sign TestUser47's EC Request - PASSED
cert.sh: Import TestUser47's EC Cert --------------------------
certutil -A -n TestUser47-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser47-ec.cert
cert.sh: #8602: Import TestUser47's EC Cert - PASSED
cert.sh SUCCESS: TestUser47's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8603: Generate mixed EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw 
cert.sh: #8604: Sign TestUser47's EC Request with RSA - PASSED
cert.sh: Import TestUser47's mixed EC Cert --------------------------
certutil -A -n TestUser47-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser47-ecmixed.cert
cert.sh: #8605: Import TestUser47's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser47's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8606: Generate Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's Request --------------------------
certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw 
cert.sh: #8607: Sign TestUser48's Request - PASSED
cert.sh: Import TestUser48's Cert --------------------------
certutil -A -n TestUser48 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser48.cert
cert.sh: #8608: Import TestUser48's Cert - PASSED
cert.sh SUCCESS: TestUser48's Cert Created
cert.sh: Generate EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8609: Generate EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request --------------------------
certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw 
cert.sh: #8610: Sign TestUser48's EC Request - PASSED
cert.sh: Import TestUser48's EC Cert --------------------------
certutil -A -n TestUser48-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser48-ec.cert
cert.sh: #8611: Import TestUser48's EC Cert - PASSED
cert.sh SUCCESS: TestUser48's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8612: Generate mixed EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw 
cert.sh: #8613: Sign TestUser48's EC Request with RSA - PASSED
cert.sh: Import TestUser48's mixed EC Cert --------------------------
certutil -A -n TestUser48-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser48-ecmixed.cert
cert.sh: #8614: Import TestUser48's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser48's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8615: Generate Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's Request --------------------------
certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw 
cert.sh: #8616: Sign TestUser49's Request - PASSED
cert.sh: Import TestUser49's Cert --------------------------
certutil -A -n TestUser49 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser49.cert
cert.sh: #8617: Import TestUser49's Cert - PASSED
cert.sh SUCCESS: TestUser49's Cert Created
cert.sh: Generate EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8618: Generate EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request --------------------------
certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw 
cert.sh: #8619: Sign TestUser49's EC Request - PASSED
cert.sh: Import TestUser49's EC Cert --------------------------
certutil -A -n TestUser49-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser49-ec.cert
cert.sh: #8620: Import TestUser49's EC Cert - PASSED
cert.sh SUCCESS: TestUser49's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8621: Generate mixed EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw 
cert.sh: #8622: Sign TestUser49's EC Request with RSA - PASSED
cert.sh: Import TestUser49's mixed EC Cert --------------------------
certutil -A -n TestUser49-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser49-ecmixed.cert
cert.sh: #8623: Import TestUser49's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser49's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8624: Generate Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw 
cert.sh: #8625: Sign TestUser50's Request - PASSED
cert.sh: Import TestUser50's Cert --------------------------
certutil -A -n TestUser50 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser50.cert
cert.sh: #8626: Import TestUser50's Cert - PASSED
cert.sh SUCCESS: TestUser50's Cert Created
cert.sh: Generate EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8627: Generate EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw 
cert.sh: #8628: Sign TestUser50's EC Request - PASSED
cert.sh: Import TestUser50's EC Cert --------------------------
certutil -A -n TestUser50-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser50-ec.cert
cert.sh: #8629: Import TestUser50's EC Cert - PASSED
cert.sh SUCCESS: TestUser50's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8630: Generate mixed EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw 
cert.sh: #8631: Sign TestUser50's EC Request with RSA - PASSED
cert.sh: Import TestUser50's mixed EC Cert --------------------------
certutil -A -n TestUser50-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser50-ecmixed.cert
cert.sh: #8632: Import TestUser50's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser50's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8633: Generate Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's Request --------------------------
certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw 
cert.sh: #8634: Sign TestUser51's Request - PASSED
cert.sh: Import TestUser51's Cert --------------------------
certutil -A -n TestUser51 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser51.cert
cert.sh: #8635: Import TestUser51's Cert - PASSED
cert.sh SUCCESS: TestUser51's Cert Created
cert.sh: Generate EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8636: Generate EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request --------------------------
certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw 
cert.sh: #8637: Sign TestUser51's EC Request - PASSED
cert.sh: Import TestUser51's EC Cert --------------------------
certutil -A -n TestUser51-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser51-ec.cert
cert.sh: #8638: Import TestUser51's EC Cert - PASSED
cert.sh SUCCESS: TestUser51's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8639: Generate mixed EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw 
cert.sh: #8640: Sign TestUser51's EC Request with RSA - PASSED
cert.sh: Import TestUser51's mixed EC Cert --------------------------
certutil -A -n TestUser51-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser51-ecmixed.cert
cert.sh: #8641: Import TestUser51's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser51's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8642: Generate Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's Request --------------------------
certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw 
cert.sh: #8643: Sign TestUser52's Request - PASSED
cert.sh: Import TestUser52's Cert --------------------------
certutil -A -n TestUser52 -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser52.cert
cert.sh: #8644: Import TestUser52's Cert - PASSED
cert.sh SUCCESS: TestUser52's Cert Created
cert.sh: Generate EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8645: Generate EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request --------------------------
certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw 
cert.sh: #8646: Sign TestUser52's EC Request - PASSED
cert.sh: Import TestUser52's EC Cert --------------------------
certutil -A -n TestUser52-ec -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser52-ec.cert
cert.sh: #8647: Import TestUser52's EC Cert - PASSED
cert.sh SUCCESS: TestUser52's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req


Generating key.  This may take a few moments...

cert.sh: #8648: Generate mixed EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw 
cert.sh: #8649: Sign TestUser52's EC Request with RSA - PASSED
cert.sh: Import TestUser52's mixed EC Cert --------------------------
certutil -A -n TestUser52-ecmixed -t u,u,u -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/client -f ../tests.pw -i TestUser52-ecmixed.cert
cert.sh: #8650: Import TestUser52's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser52's mixed EC Cert Created
cert.sh: Creating CA CRL =====================================
cert.sh: Generating CRL for range 40-42 TestCA authority --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or
cert.sh: #8651: Generating CRL for range 40-42 TestCA authority - PASSED
cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority --------------------------
crlutil -q -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec
cert.sh: #8652: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED
cert.sh: Modifying CA CRL by adding one more cert ============
cert.sh: Modify CRL by adding one more cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or
cert.sh: #8653: Modify CRL by adding one more cert - PASSED
cert.sh: Modify CRL (ECC) by adding one more cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec
cert.sh: #8654: Modify CRL (ECC) by adding one more cert - PASSED
cert.sh: Modifying CA CRL by removing one cert ===============
cert.sh: Modify CRL by removing one cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1
cert.sh: #8655: Modify CRL by removing one cert - PASSED
cert.sh: Modify CRL (ECC) by removing one cert --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec
cert.sh: #8656: Modify CRL (ECC) by removing one cert - PASSED
cert.sh: Creating CA CRL for groups 1 and 2  ===============
cert.sh: Creating CRL for groups 1 and 2 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42
cert.sh: #8657: Creating CRL for groups 1 and 2 - PASSED
cert.sh: Creating CRL (ECC) for groups 1 and 2 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec
cert.sh: #8658: Creating CRL (ECC) for groups 1 and 2 - PASSED
cert.sh: Creating CA CRL for groups 1, 2 and 3  ===============
cert.sh: Creating CRL for groups 1, 2 and 3 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48
cert.sh: #8659: Creating CRL for groups 1, 2 and 3 - PASSED
cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 --------------------------
crlutil -q -d /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec
cert.sh: #8660: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED
cert.sh: Importing Server CA Issued CRL for certs  trough 52
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -D -n TestCA -f ../tests.pw -d ../server
crlutil: could not find TestCA's CRL: No matching CRL was found.
crlutil: could not find the issuer TestCA's CRL: No matching CRL was found.
cert.sh: #8661: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server
cert.sh: #8662: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server
crlutil: could not find TestCA-ec's CRL: No matching CRL was found.
crlutil: could not find the issuer TestCA-ec's CRL: No matching CRL was found.
cert.sh: #8663: Importing CRL (ECC) for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server
cert.sh: #8664: Importing CRL (ECC) for groups 1 - PASSED
cert.sh SUCCESS: SSL CRL prep passed
cert.sh cert.sh: finished cert.sh
TIMESTAMP cert END: Tue Nov 27 19:29:18 EST 2012
Running tests for dbtests
TIMESTAMP dbtests BEGIN: Tue Nov 27 19:29:18 EST 2012
dbtests.sh: CERT and Key DB Tests ===============================

---------------------------------------------------------------
| test opening the database read/write in a nonexisting directory
---------------------------------------------------------------
certutil: function failed: security library: bad database.
dbtests.sh: #8665: Certutil didn't work in a nonexisting dir 255 - PASSED
dbdir selected is ./non_existent_dir

ERROR: Directory "./non_existent_dir" does not exist.
dbtest: function failed: security library: bad database.
dbtests.sh: #8666: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED

---------------------------------------------------------------
| test force opening the database in a nonexisting directory
---------------------------------------------------------------
dbdir selected is ./non_existent_dir

ERROR: Directory "./non_existent_dir" does not exist.
dbtests.sh: #8667: Dbtest force succeeded in a nonexisting dir 0 - PASSED

---------------------------------------------------------------
| test opening the database readonly in an empty directory
---------------------------------------------------------------
tstclnt: unable to open cert database: security library: bad database.
dbtests.sh: #8668: Tstclnt didn't work in an empty dir 1 - PASSED
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir

database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir/secmod.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir/secmod.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir/cert8.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir/cert8.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir/key3.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir/key3.db" does not exist.
dbtest: function failed: security library: bad database.
dbtests.sh: #8669: Dbtest readonly didn't work in an empty dir 46 - PASSED
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir

dbtests.sh: #8670: Dbtest logout after empty DB Init has key - PASSED
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir

dbtests.sh: #8671: Dbtest password DB Init maintains needlogin state - PASSED
certutil: could not find certificate named "xxxx": Unrecognized Object Identifier.
dbtests.sh: #8672: Certutil didn't work in an empty dir 255 - PASSED

---------------------------------------------------------------
| test force opening the database  readonly in a empty directory
---------------------------------------------------------------
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir

database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir/secmod.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir/secmod.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir/cert8.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir/cert8.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir/key3.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/emptydir/key3.db" does not exist.
dbtests.sh: #8673: Dbtest force readonly succeeded in an empty dir 0 - PASSED

---------------------------------------------------------------
| test opening the database r/w in a readonly directory
---------------------------------------------------------------
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir

ERROR: Directory "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir" is not writeable.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/secmod.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/secmod.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/cert8.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/cert8.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/key3.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/key3.db" does not exist.
dbtest: function failed: security library: invalid arguments.
dbtests.sh: #8674: Dbtest r/w didn't work in an readonly dir 46 - PASSED
certutil: could not find certificate named "TestUser": Unrecognized Object Identifier.
dbtests.sh: #8675: Certutil didn't work in an readonly dir 255 - PASSED

---------------------------------------------------------------
| test opening the database ronly in a readonly directory
---------------------------------------------------------------
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir

database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/secmod.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/secmod.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/cert8.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/cert8.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/key3.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/key3.db" does not exist.
dbtests.sh: #8676: Dbtest readonly succeeded in a readonly dir 0 - PASSED

---------------------------------------------------------------
| test force opening the database  r/w in a readonly directory
---------------------------------------------------------------
dbdir selected is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir

ERROR: Directory "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir" is not writeable.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/secmod.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/secmod.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/cert8.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/cert8.db" does not exist.
database checked is /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/key3.db
ERROR: File "/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/key3.db" does not exist.
dbtests.sh: #8677: Dbtest force succeeded in a readonly dir 0 - PASSED

---------------------------------------------------------------
| ls -l /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir
---------------------------------------------------------------
dr-xr-xr-x. 2 tinderbox tinderbox  4096 Nov 27 19:29 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir
-r--------. 1 tinderbox tinderbox 95232 Nov 27 19:29 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/cert9.db
-r--------. 1 tinderbox tinderbox 58368 Nov 27 19:29 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/key4.db
-r--------. 1 tinderbox tinderbox   724 Nov 27 19:29 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/pkcs11.txt
-r--r-----. 1 tinderbox tinderbox   392 Nov 27 19:29 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/req
-r--r-----. 1 tinderbox tinderbox   609 Nov 27 19:29 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/TestUser.cert
-r--r-----. 1 tinderbox tinderbox   578 Nov 27 19:29 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/TestUser-ec.cert
-r--r-----. 1 tinderbox tinderbox   576 Nov 27 19:29 /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/ronlydir/TestUser-ecmixed.cert

---------------------------------------------------------------
| test creating a new cert with a conflicting nickname
---------------------------------------------------------------
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/conflictdir
certutil: could not add certificate to token or database: Error adding certificate to database.
dbtests.sh: #8678: Nicknane conflict test, could not import conflict nickname 255 - PASSED

---------------------------------------------------------------
| test importing an old cert to a conflicting nickname
---------------------------------------------------------------
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 40 (0x28)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:39 2012
            Not After : Tue Nov 28 00:25:39 2017
        Subject: "CN=Bob,E=Bob@bogus.com,O=BOGUS NSS,L=Mountain View,ST=Calif
            ornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    9a:64:6b:e3:ce:e5:f4:51:93:e2:2a:e6:f3:3e:6d:d9:
                    62:44:71:8f:6b:50:64:5d:2c:4a:9a:e8:91:6b:c1:c3:
                    93:49:5d:0e:29:99:d8:e8:53:00:b5:f8:67:9b:a7:32:
                    ad:24:c1:89:b1:76:05:80:b4:18:6e:e2:80:f0:93:ea:
                    cf:e3:f6:74:9c:66:90:01:36:a9:da:a3:29:fd:0e:a0:
                    ba:e9:7d:4f:97:0f:45:51:c0:4d:1c:c2:12:1c:43:c4:
                    d5:0d:00:2e:79:15:32:2c:c2:1e:07:2d:70:68:c4:42:
                    a5:9a:24:31:ac:3f:e6:7b:e3:5c:82:50:c9:97:8a:85
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        13:74:0c:77:7e:c1:79:05:b2:c7:65:09:9b:36:4f:14:
        2b:47:36:43:c5:68:ad:8b:0d:18:64:65:bf:45:db:2b:
        43:e5:f5:4f:e4:43:b4:a7:8f:03:5a:06:d8:17:a3:d3:
        1f:e0:1f:6f:5e:48:d9:62:41:4a:8e:f7:c1:b0:3c:5e:
        e6:4c:a1:ea:aa:09:34:5f:3a:38:2c:45:e8:3c:2a:ab:
        08:4d:9d:81:d2:2d:77:d7:d6:46:df:73:3b:41:11:4b:
        f8:76:50:71:4b:81:c1:5c:28:b5:4b:03:bd:f4:fe:f2:
        e0:e1:dd:96:ca:b8:d0:63:14:94:e8:95:14:02:ff:b4
    Fingerprint (MD5):
        D5:34:B8:6C:DF:D7:E8:A1:CA:2C:54:EA:26:FD:ED:86
    Fingerprint (SHA1):
        1C:AF:54:8A:3A:37:5D:81:F8:7E:BA:E8:55:7B:40:EE:C2:66:51:64

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

dbtests.sh: #8679: Nicknane conflict test-setting nickname conflict was correctly rejected - PASSED
TIMESTAMP dbtests END: Tue Nov 27 19:29:23 EST 2012
Running tests for tools
TIMESTAMP tools BEGIN: Tue Nov 27 19:29:23 EST 2012
tools.sh: Tools Tests with ECC ===============================
tools.sh: Exporting Alice's email cert & key - default ciphers
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8680: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                fc:af:ae:1a:03:e9:66:40:a2:ac:f1:cb:29:64:df:16
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8681: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8682: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's email EC cert & key---------------
pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \
         -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8683: Exporting Alice's email EC cert & key (pk12util -o)  - PASSED
tools.sh: Importing Alice's email EC cert & key --------------
pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8684: Importing Alice's email EC cert & key (pk12util -i)  - PASSED
tools.sh: Listing Alice's pk12 EC file -----------------
pk12util -l Alice-ec.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice-ec

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                e5:b8:f2:8a:bb:a8:6e:a7:4f:9f:fe:a2:10:56:c0:8a
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Wed Nov 28 00:24:42 2012
            Not After : Tue Nov 28 00:24:42 2062
        Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor
            nia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:23
            EC Public Key:
                PublicValue:
                    04:00:20:d6:7b:0f:e5:4f:02:20:32:57:e7:fd:0d:54:
                    14:f0:b7:aa:d0:04:25:64:45:4e:a2:be:c5:a7:94:75:
                    bb:b8:eb:84:db:e2:9f:06:91:95:12:6a:50:02:89:25:
                    e2:8c:34:fc:ed:17:1c:b8:42:4e:ea:e3:44:5f:f1:a2:
                    86:71:18:01:37:30:1e:74:52:a9:b5:05:36:87:1f:c2:
                    e2:61:e0:fb:cb:ea:6a:a2:4c:34:18:20:f4:9b:de:e5:
                    0a:9a:e5:f5:06:30:c9:7d:fe:ff:e9:04:28:21:b0:4f:
                    0e:de:91:c6:51:41:ef:7e:f7:ea:9c:54:7e:21:a5:31:
                    9c:c7:4c:ef:8c
                Curve: SECG elliptic curve secp521r1 (aka NIST P-521)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:88:02:42:00:e4:cc:d6:b2:04:8d:cd:7d:bf:0b:
        a8:74:a3:6c:ea:a7:80:c9:1e:4c:c3:87:bb:b2:01:ba:
        5e:38:05:67:2a:9b:aa:9c:a0:29:80:e6:31:c7:e9:f4:
        6f:26:cc:b1:72:84:8f:4c:5b:b0:58:27:9b:69:c1:f5:
        8d:94:3b:ab:ab:13:e4:02:42:00:ac:ad:8a:14:b2:72:
        2e:27:9d:71:39:d1:c6:9f:61:58:08:36:02:b7:94:a2:
        f6:bd:05:cc:ca:5a:a5:7a:c5:77:d8:18:c8:01:e5:58:
        e7:cd:52:c6:28:fb:92:61:c7:15:f9:39:ae:84:83:1b:
        b8:ba:64:97:0b:09:e8:41:52:6d:57
    Fingerprint (MD5):
        38:45:EF:6F:DF:21:F6:9D:DF:3E:E7:EB:0F:32:ED:DB
    Fingerprint (SHA1):
        C8:5A:3E:FC:56:F5:70:0E:B9:28:A1:75:88:A0:D6:98:45:2C:91:F0

    Friendly Name: TestCA-ec

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: X9.62 ECDSA signature with SHA-1
        Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
            ia,C=US"
        Validity:
            Not Before: Wed Nov 28 00:25:34 2012
            Not After : Tue Nov 28 00:25:34 2017
        Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S
            T=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: X9.62 elliptic curve public key
                Args:
                    06:05:2b:81:04:00:22
            EC Public Key:
                PublicValue:
                    04:f0:e0:0e:88:eb:bd:49:ec:71:b6:21:12:53:0f:aa:
                    66:37:ed:13:41:88:31:7e:92:10:54:20:8e:3a:51:51:
                    d4:e2:4b:4d:df:54:ba:ae:b6:de:7c:be:f1:69:77:fa:
                    d7:75:47:f3:af:db:07:93:ed:32:ea:e4:09:8a:21:e4:
                    ae:87:29:63:03:2d:0e:06:ea:ca:cb:27:9c:bb:01:08:
                    55:30:9a:6c:e9:5d:8d:b6:b7:48:17:9a:8b:19:45:5f:
                    fa
                Curve: SECG elliptic curve secp384r1 (aka NIST P-384)
    Signature Algorithm: X9.62 ECDSA signature with SHA-1
    Signature:
        30:81:86:02:41:7a:8f:74:36:f4:e3:cf:d1:29:da:65:
        c0:02:5d:9a:7b:ef:f8:a9:99:83:d7:56:a7:fe:e2:2b:
        3c:ce:9a:7b:df:48:6a:e1:60:64:42:c6:9d:de:cc:e6:
        d7:5b:0b:80:4d:dd:83:0c:c1:a7:6d:bc:06:56:c0:0a:
        8b:41:da:dc:bd:b8:02:41:5c:09:8b:c5:82:b9:b0:9a:
        83:79:c2:9a:8d:df:b8:58:04:27:f2:32:a8:0e:e1:16:
        97:95:41:ae:15:30:e0:b3:3e:1b:62:3a:39:bc:fd:24:
        54:62:32:5a:03:a9:20:23:d2:3a:cd:a0:75:f5:25:e6:
        b5:70:8b:d1:f2:fd:78:29:9a
    Fingerprint (MD5):
        0F:49:D4:CD:48:6D:F2:8D:80:5C:52:21:7D:1E:C3:08
    Fingerprint (SHA1):
        47:1C:E6:51:B0:B3:F5:E4:28:1B:02:98:B7:63:78:58:71:63:AE:75

    Friendly Name: Alice-ec

tools.sh: #8685: Listing Alice's pk12 EC file (pk12util -l)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8686: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                da:94:26:1f:e2:9f:0c:b6:16:dd:a7:d9:00:4c:a5:49
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8687: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8688: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8689: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                71:20:8b:51:29:12:19:1e:d6:bd:d2:8c:dd:aa:da:d9
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8690: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8691: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c RC2-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8692: Exporting with [RC2-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
        Parameters:
            Salt:
                3b:94:7a:05:01:39:14:64:d5:39:5e:2b:51:83:37:d5
            Iteration Count: 2000 (0x7d0)
tools.sh: #8693: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8694: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8695: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                bb:b2:6b:25:84:76:aa:a2:1e:41:57:f9:53:ca:e9:27
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8696: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8697: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8698: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                63:07:d0:8b:45:8b:9b:e4:04:dd:59:57:b2:d4:07:ce
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8699: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8700: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8701: Exporting with [DES-EDE3-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                b0:94:0c:39:91:42:d4:c5:fa:82:64:3b:a3:a5:43:84
            Iteration Count: 2000 (0x7d0)
tools.sh: #8702: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8703: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8704: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        71:3e:94:1d:9b:95:40:d5:50:36:29:b6:a0:20:89:59
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:77:b1:d2:44:9a:b0:f2:9c:65:fa:2d:99:ed:41:
                    1d:5b
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8705: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8706: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8707: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        6f:ca:04:38:f0:cc:38:ff:70:97:d3:3a:69:67:c3:44
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:f2:94:18:82:53:3d:79:11:46:3f:80:53:4b:82:
                    26:e6
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8708: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8709: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8710: Exporting with [AES-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        d6:5f:fa:d7:e9:e0:93:fd:1e:f2:c7:f2:1f:d2:0c:4a
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-128-CBC
                Args:
                    04:10:1e:43:68:12:4f:c2:bc:a9:a5:6c:3f:20:77:ee:
                    9d:76
tools.sh: #8711: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8712: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8713: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        52:de:a8:4c:c4:d0:50:b6:1f:35:b8:a0:69:cf:a5:ae
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:0c:d5:24:24:6f:50:ba:fa:3e:bc:21:da:94:9e:
                    d1:ed
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8714: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8715: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8716: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        69:23:c2:43:a5:f7:c0:bb:f0:78:19:4a:bc:22:e5:ca
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:6b:78:1a:96:5a:aa:d5:22:23:f9:39:e0:b1:cc:
                    2a:17
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8717: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8718: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8719: Exporting with [AES-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        eb:11:a8:43:80:42:90:b4:19:c7:7f:59:9b:80:19:d8
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-192-CBC
                Args:
                    04:10:0d:72:cc:f3:43:ce:1e:6f:20:53:97:c1:01:50:
                    ff:09
tools.sh: #8720: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8721: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8722: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        ff:ca:b8:16:50:ee:d4:2f:9b:9d:55:5f:d2:61:ac:da
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:59:ee:47:44:06:7a:32:18:be:6b:a8:99:97:8d:
                    1a:4c
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8723: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8724: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8725: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        65:a5:7b:00:de:17:ba:ae:44:0d:d4:3c:03:a1:7f:0f
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:ca:94:0d:be:5d:d1:85:90:04:4c:79:e8:d7:ce:
                    23:39
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8726: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8727: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8728: Exporting with [AES-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        3d:ef:64:47:52:25:62:4a:4a:aa:9d:32:7d:89:3d:e4
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: AES-256-CBC
                Args:
                    04:10:78:f0:f6:df:4f:9f:dc:e8:fd:38:22:11:72:54:
                    b5:25
tools.sh: #8729: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8730: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8731: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        7b:25:e1:ab:13:dc:21:c8:ad:63:c1:48:50:d7:79:ed
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:be:d1:d4:09:67:48:d7:5d:ad:fc:bc:ff:db:ea:
                    45:14
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8732: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8733: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8734: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        5f:b1:e7:2b:4e:84:16:19:37:f1:fb:50:77:89:d2:cb
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:88:0b:3d:37:35:91:13:51:6d:b6:90:cf:32:15:
                    16:a5
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8735: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8736: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8737: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        02:df:4a:e0:09:e3:16:28:f7:ae:ec:31:c1:80:69:4f
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-128-CBC
                Args:
                    04:10:c5:fa:72:41:7c:ab:7b:47:91:04:2a:76:91:a2:
                    05:17
tools.sh: #8738: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8739: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8740: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        d9:97:16:d4:25:ea:d3:d3:0e:cf:cc:78:4f:a9:f6:c2
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:f2:23:d1:3a:e1:35:fb:11:e7:ee:34:9c:ee:da:
                    83:a8
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8741: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8742: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8743: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        b2:55:55:71:68:4d:89:cc:8f:57:d4:de:88:88:8f:9e
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:ac:b2:da:8c:ae:57:99:3f:81:ec:91:ce:fc:9e:
                    26:e4
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8744: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8745: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8746: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        85:70:4d:66:e3:2a:e0:36:e1:9c:97:b3:c4:57:01:ff
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-192-CBC
                Args:
                    04:10:bd:4c:6a:22:af:94:cb:b8:cd:20:82:53:9d:5c:
                    1b:b2
tools.sh: #8747: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8748: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8749: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        88:b5:fa:41:8f:d1:8a:4f:84:05:07:e0:22:4b:da:8b
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:5b:4d:b1:08:8b:e6:9d:6e:21:92:77:ee:32:7b:
                    e2:e5
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8750: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8751: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8752: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        de:ed:35:23:60:79:63:9a:3d:53:25:29:72:7b:86:26
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:12:cd:c3:e9:91:ce:59:bb:11:da:d7:4a:ac:fb:
                    d4:e2
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8753: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8754: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8755: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption v2 
        Encryption:
            KDF: PKCS #5 Password Based Key Dervive Function v2 
                Parameters:
                    Salt:
                        63:04:e4:f1:c2:8d:03:0b:31:00:56:4a:fe:56:f6:85
                    Iteration Count: 2000 (0x7d0)
                    Key Length: 32 (0x20)
                    KDF algorithm: HMAC SHA-1
            Cipher: CAMELLIA-256-CBC
                Args:
                    04:10:18:1a:f1:a3:02:6e:42:73:39:e8:ca:4a:1a:89:
                    d8:3d
tools.sh: #8756: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8757: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8758: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                2a:49:b1:fd:ef:14:0a:bf:8c:e6:c8:7c:cd:4d:07:b6
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8759: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8760: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8761: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                cb:b3:c1:29:4b:6e:ec:42:98:7d:a3:84:b2:7a:88:58
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8762: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8763: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8764: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                4b:0b:9b:8d:1b:75:3e:19:1a:ca:24:20:a0:24:46:69
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8765: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8766: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8767: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                9c:d5:8b:9f:5b:10:8f:1f:5d:89:8b:c2:b4:ae:a8:20
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8768: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8769: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8770: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
        Parameters:
            Salt:
                2d:9e:30:98:09:c0:a9:36:41:32:5e:9b:b5:63:e1:57
            Iteration Count: 2000 (0x7d0)
tools.sh: #8771: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8772: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8773: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                a9:5b:14:6a:eb:dc:f6:06:1c:e8:77:3b:0d:ec:ac:f2
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8774: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8775: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8776: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                72:d9:cd:6f:73:3c:36:d0:52:68:6c:cd:60:8e:91:68
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8777: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8778: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8779: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                5c:9f:5a:59:34:b0:15:b5:c8:7c:5e:37:3c:e2:1c:5f
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8780: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8781: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8782: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                29:ff:e6:78:80:e2:f1:4c:4a:cc:21:87:be:e7:22:d0
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8783: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8784: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8785: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
        Parameters:
            Salt:
                46:5c:dd:28:04:07:76:25:0a:42:84:a1:bd:b9:fb:be
            Iteration Count: 2000 (0x7d0)
tools.sh: #8786: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8787: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8788: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                42:04:49:51:43:58:9d:a1:e6:78:f2:30:21:56:46:74
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8789: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8790: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8791: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                42:5c:35:e2:a2:c6:a1:da:4e:af:e6:e8:41:66:e4:38
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8792: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8793: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8794: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                a9:99:55:8d:37:b1:ca:2a:45:de:0a:fa:4b:00:ed:d0
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8795: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8796: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8797: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                53:10:6c:df:57:4c:eb:9c:8d:78:c9:78:c4:03:c2:a8
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8798: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8799: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8800: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
        Parameters:
            Salt:
                61:b6:ca:55:f3:19:fe:5c:8c:ec:d0:6f:52:5f:98:16
            Iteration Count: 2000 (0x7d0)
tools.sh: #8801: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8802: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8803: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                e9:f1:28:37:59:6e:6f:37:24:7f:a5:a8:2a:01:6e:71
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8804: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8805: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8806: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                a0:e4:04:b0:d0:2d:ab:66:24:da:44:98:c3:6a:70:e9
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8807: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8808: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8809: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                15:77:4a:bb:f4:16:88:88:41:c5:8b:aa:f0:32:8d:60
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8810: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8811: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8812: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                36:fe:be:bc:ad:63:1b:31:ad:64:bf:36:c0:49:2f:c7
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8813: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8814: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting with [default:null]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8815: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                47:86:c6:42:a6:a9:4c:d6:3b:0e:fc:48:89:24:3d:a9
            Iteration Count: 2000 (0x7d0)
tools.sh: #8816: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8817: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8818: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                8e:86:50:f6:8b:c2:8f:82:b9:41:0c:33:b5:d3:c8:8c
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8819: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8820: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8821: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                b2:5c:1c:23:e6:7e:02:ce:2e:a5:62:c4:17:73:cc:94
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8822: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8823: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8824: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                3b:44:a0:29:38:7a:eb:31:fb:0d:38:75:d1:21:75:b0
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8825: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8826: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8827: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                a3:5f:33:0e:30:1f:d6:60:35:da:da:87:12:01:2c:fc
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8828: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8829: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8830: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                d3:84:ab:c6:e8:a2:7e:97:77:89:30:a7:40:3e:d6:c7
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8831: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8832: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8833: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                c3:d1:28:38:36:7e:d0:35:90:7c:c1:02:2e:ba:f0:28
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8834: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8835: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8836: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                6a:c8:b0:ba:49:75:85:2f:69:80:08:d7:0e:4b:42:bb
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8837: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8838: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8839: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                e0:db:50:fe:f6:6c:54:5a:aa:48:6d:8b:67:88:b4:ec
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8840: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8841: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8842: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                a1:4d:66:e7:25:d4:93:6c:ca:8f:6c:8f:60:5e:16:01
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8843: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8844: Importing Alice.p12 (pk12util -i)  - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8845: Exporting Alices's key & cert with [default:default] (pk12util -o)  - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
    Friendly Name: Alice

    Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
        Parameters:
            Salt:
                00:4d:e4:a0:0e:b8:c4:34:07:e8:88:72:bf:84:41:0b
            Iteration Count: 2000 (0x7d0)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:24:29 2012
            Not After : Tue Nov 28 00:24:29 2062
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b5:06:c3:3b:b8:87:66:e0:0b:f1:a3:7a:f4:ea:fc:39:
                    66:0d:b6:85:e4:cb:b2:9e:fd:d5:0a:65:6d:8f:15:57:
                    26:7b:51:d3:78:e2:a7:e1:90:07:8e:01:76:f4:02:78:
                    0c:ce:17:e7:f8:b7:a1:96:00:1a:82:ad:db:a1:3d:8e:
                    05:b7:9c:65:3b:2c:d8:5d:62:70:67:e5:6f:d1:fc:28:
                    65:42:c5:d1:3d:25:94:64:e1:13:87:d1:7d:66:7e:fa:
                    e9:96:e4:5c:25:83:5a:1f:ea:dd:28:8e:63:80:6a:ad:
                    14:e4:1e:92:4b:43:51:d3:ab:42:9e:5c:e3:5c:03:65
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        84:37:58:58:95:dd:fc:04:db:96:fa:63:22:12:07:d9:
        84:5d:93:cf:13:75:ce:70:05:41:82:97:7c:bb:e3:71:
        83:a8:7d:86:33:3b:e8:26:67:ee:7d:d0:65:1d:8e:e8:
        b0:44:9f:94:48:5a:8d:f0:5c:bb:31:d5:68:2a:0c:30:
        54:4a:30:3f:e8:37:a3:2c:b9:8b:42:96:6f:9a:84:32:
        f0:60:97:ea:8d:d2:1f:e2:76:e5:1c:53:80:ab:50:0f:
        9a:58:60:42:95:78:72:d4:67:22:3a:b7:26:91:d8:a0:
        03:f4:79:85:ac:a0:6c:23:68:53:86:0c:f8:ae:b9:73
    Fingerprint (MD5):
        74:E9:ED:A8:D0:02:64:C8:CF:21:1A:D4:06:84:BC:9A
    Fingerprint (SHA1):
        FC:58:83:70:EA:61:49:4A:85:63:E1:13:E5:88:E5:F5:29:4B:50:92

    Friendly Name: TestCA

Certificate(has private key):
    Data:
        Version: 3 (0x2)
        Serial Number: 30 (0x1e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:25:33 2012
            Not After : Tue Nov 28 00:25:33 2017
        Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
            alifornia,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:e9:0d:ca:37:79:d4:b2:03:dd:4d:74:50:e6:a1:0a:
                    78:36:e7:2f:f4:dc:6b:ca:32:38:06:75:63:6d:4b:66:
                    85:fa:f6:77:59:7f:d4:9f:85:39:87:fe:ad:72:6a:d8:
                    76:17:9c:eb:45:37:93:16:e2:71:1e:2b:9c:23:29:53:
                    d0:7e:76:ac:ff:6f:29:6b:69:87:ad:c5:12:4c:9c:4f:
                    e1:f6:d6:57:52:ad:94:14:f8:36:4c:74:bb:c8:d0:15:
                    f6:a5:f7:5a:27:82:cc:8e:93:7d:b4:6f:75:9d:db:67:
                    06:a0:30:c0:d2:91:a3:4e:ee:85:89:ed:e9:f4:bf:43
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:a2:d7:d1:72:03:cb:52:c1:48:ff:bc:94:f7:7f:be:
        e7:9a:2d:1d:fd:68:d9:3a:e9:0b:9d:cb:2d:19:27:18:
        0f:fd:6f:fa:b8:ce:7e:98:82:78:59:d0:33:11:f2:fa:
        5f:e4:c1:5e:20:f0:51:62:ee:ed:1b:a1:63:17:d3:40:
        19:dd:9b:d2:48:bb:a0:43:44:60:ae:be:02:a2:e7:6e:
        eb:50:69:15:ed:09:ad:60:ee:31:96:26:1f:c9:32:75:
        02:6f:74:0b:2a:d4:5b:73:dd:49:f7:85:a6:1d:74:2e:
        2f:34:8e:5b:bd:52:e3:cf:05:f5:a2:b2:ae:db:ee:46
    Fingerprint (MD5):
        62:BD:C9:57:BF:AC:58:F0:17:73:78:B6:83:25:E5:ED
    Fingerprint (SHA1):
        AE:81:2F:2B:B5:3D:87:D8:55:F4:DB:49:CD:4F:83:0F:0B:11:5E:1A

    Friendly Name: Alice

tools.sh: #8846: Listing Alice.p12 (pk12util -l)  - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #8847: Importing Alice.p12 (pk12util -i)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -c null
pk12util: Algorithm: "null": security library: invalid algorithm.
tools.sh: #8848: Exporting with [null:default] (pk12util -o)  - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
         -k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #8849: Exporting with [default:null] (pk12util -o)  - PASSED
tools.sh: Create objsign cert -------------------------------
signtool -G "objectsigner" -d ../tools/signdir -p "nss"

WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit the browser before continuing this operation. Enter 
"y" to continue, or anything else to abort: 

Enter certificate information.  All fields are optional. Acceptable
characters are numbers, letters, spaces, and apostrophes.
certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair
certificate request generated
certificate has been signed
certificate "objsigner" added to database
Exported certificate to x509.raw and x509.cacert.
tools.sh: #8850: Create objsign cert (signtool -G)  - PASSED
tools.sh: Signing a jar of files ----------------------------
signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> signjs.html
adding ../tools/html/signjs.html to nojs.jar...(deflated 28%)
--> sign.html
adding ../tools/html/sign.html to nojs.jar...(deflated 26%)
Generating zigbert.sf file..
adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%)
adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%)
tree "../tools/html" signed successfully
tools.sh: #8851: Signing a jar of files (signtool -Z)  - PASSED
tools.sh: Listing signed files in jar ----------------------
signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner
archive "nojs.jar" has passed crypto verification.
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match
found a RSA signature file: META-INF/zigbert.rsa

          status   path
    ------------   -------------------
        verified   signjs.html
        verified   sign.html
tools.sh: #8852: Listing signed files in jar (signtool -v)  - PASSED
tools.sh: Show who signed jar ------------------------------
signtool -w nojs.jar -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #8853: Show who signed jar (signtool -w)  - PASSED
tools.sh: Signing a xpi of files ----------------------------
signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \
         ../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> signjs.html
--> sign.html
Generating zigbert.sf file..
Creating XPI Compatible Archive 
adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%)
--> sign.html
adding ../tools/html/sign.html to nojs.xpi...(deflated 26%)
adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%)
tree "../tools/html" signed successfully
tools.sh: #8854: Signing a xpi of files (signtool -Z -X)  - PASSED
tools.sh: Listing signed files in xpi ----------------------
signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner
archive "nojs.xpi" has passed crypto verification.
found a RSA signature file: META-INF/zigbert.rsa
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
  md5 digest on global metainfo: match
  sha digest on global metainfo: match

          status   path
    ------------   -------------------
        verified   signjs.html
        verified   sign.html
tools.sh: #8855: Listing signed files in xpi (signtool -v)  - PASSED
tools.sh: Show who signed xpi ------------------------------
signtool -w nojs.xpi -d ../tools/signdir

Signer information:

nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #8856: Show who signed xpi (signtool -w)  - PASSED
TIMESTAMP tools END: Tue Nov 27 19:30:29 EST 2012
Running tests for fips
TIMESTAMP fips BEGIN: Tue Nov 27 19:30:29 EST 2012
fips.sh: FIPS 140 Compliance Tests ===============================
fips.sh: Verify this module is in FIPS mode  -----------------
modutil -dbdir ../fips -list

Listing of PKCS #11 Modules
-----------------------------------------------------------
  1. NSS Internal FIPS PKCS #11 Module
 slots: 1 slot attached
status: loaded

 slot: NSS FIPS 140-2 User Private Key Services
token: NSS FIPS 140-2 Certificate DB

  2. RootCerts
library name: /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so
 slots: 1 slot attached
status: loaded

 slot: NSS Builtin Objects
token: Builtin Object Token
-----------------------------------------------------------
FIPS mode enabled.
fips.sh: #8857: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #8858: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys -------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      171695ce17bed2f46c23d520a4795203c2db41e8   NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate
fips.sh: #8859: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Attempt to list FIPS module keys with incorrect password
certutil -d ../fips -K -f /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests.fipsbadpw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
Incorrect password/PIN entered.
certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: The security password entered is incorrect.
fips.sh: #8860: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED
certutil -K returned 255
fips.sh: Validate the certificate --------------------------
certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw
certutil: certificate is valid
fips.sh: #8861: Validate the certificate (certutil -V -e) . - PASSED
fips.sh: Export the certificate and key as a PKCS#12 file --
pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 EXPORT SUCCESSFUL
fips.sh: #8862: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED
fips.sh: Export the certificate as a DER-encoded file ------
certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt
fips.sh: #8863: Export the certificate as a DER (certutil -L -r) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                Cu,Cu,Cu
fips.sh: #8864: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Delete the certificate and key from the FIPS module
certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw
fips.sh: #8865: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #8866: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys.
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
certutil: no keys found
fips.sh: #8867: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #8868: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #8869: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      171695ce17bed2f46c23d520a4795203c2db41e8   FIPS_PUB_140_Test_Certificate
fips.sh: #8870: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Delete the certificate from the FIPS module
certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate
fips.sh: #8871: Delete the certificate from the FIPS module (certutil -D) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI
fips.sh: #8872: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #8873: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

FIPS_PUB_140_Test_Certificate                                u,u,u
fips.sh: #8874: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa      171695ce17bed2f46c23d520a4795203c2db41e8   FIPS_PUB_140_Test_Certificate
fips.sh: #8875: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Run PK11MODE in FIPSMODE  -----------------
pk11mode -d ../fips -p fips- -f ../tests.fipspw
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
Loaded FC_GetFunctionList for FIPS MODE; slotID 0 
**** Total number of TESTS ran in FIPS MODE is 106. ****
**** ALL TESTS PASSED ****
fips.sh: #8876: Run PK11MODE in FIPS mode (pk11mode) . - PASSED
fips.sh: Run PK11MODE in Non FIPSMODE  -----------------
pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
loaded C_GetFunctionList for NON FIPS MODE; slotID 1 
**** Total number of TESTS ran in NON FIPS MODE is 104. ****
**** ALL TESTS PASSED ****
fips.sh: #8877: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED
mkdir /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcertdb.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcerthi.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcrmf.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libcryptohi.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libdbm.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libfreebl.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libjar.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnspr4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnspr4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnss.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssb.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckbi.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssckfw.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdbm3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdbm3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdbm.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssdev.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsspki.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsssysinit.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnsssysinit.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssutil3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libnssutil.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpk11wrap.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs12.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkcs7.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcertsel.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixchecker.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixcrlsel.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixmodule.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixparams.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixpki.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixresults.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixstore.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixsystem.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixtop.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libpkixutil.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libplc4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libplc4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libplds4.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libplds4.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsectool.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsmime3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsmime.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn3.chk /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsoftokn.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsqlite3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libsqlite.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl3.so /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
cp /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/lib/libssl.a /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle
fips.sh: Detect mangled softoken--------------------------
mangling /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle/libsoftokn3.so
mangle -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle/libsoftokn3.so -o -8 -b 5
Changing byte 0x000b28a4 (731300): from 5f (95) to 7f (127)
LD_LIBRARY_PATH=/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/fips/mangle dbtest -r -d ../fips
fips.sh: #8878: Init NSS with a corrupted library (dbtest -r) . - PASSED
fips.sh done
TIMESTAMP fips END: Tue Nov 27 19:30:57 EST 2012
Running tests for crmf
TIMESTAMP crmf BEGIN: Tue Nov 27 19:30:57 EST 2012
crmf.sh: CRMF/CMMF Tests ===============================
crmf.sh: CRMF/CMMF Tests ------------------------------
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode

crmftest v1.0
Generating CRMF request
Decoding CRMF request
crmftest: Processing cert request 0
crmftest: Processing cert request 1
Exiting successfully!!!

crmf.sh: #8879: CRMF test . - PASSED
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf

crmftest v1.0
Doing CMMF Stuff
Exiting successfully!!!

crmf.sh: #8880: CMMF test . - PASSED
TIMESTAMP crmf END: Tue Nov 27 19:30:58 EST 2012
Running tests for smime
TIMESTAMP smime BEGIN: Tue Nov 27 19:30:58 EST 2012
smime.sh: S/MIME Tests with ECC ===============================
smime.sh: Signing Detached Message {SHA1} ------------------
cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1
smime.sh: #8881: Create Detached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #8882: Verifying Alice's Detached Signature (SHA1) . - PASSED
smime.sh: Signing Attached Message (SHA1) ------------------
cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1
smime.sh: #8883: Create Attached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1
smime.sh: #8884: Decode Alice's Attached Signature (SHA1) . - PASSED
diff alice.txt alice.data.SHA1
smime.sh: #8885: Compare Attached Signed Data and Original (SHA1) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------
cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1
smime.sh: #8886: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #8887: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------
cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1
smime.sh: #8888: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1
smime.sh: #8889: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED
diff alice.txt alice-ec.data.SHA1
smime.sh: #8890: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Detached Message {SHA256} ------------------
cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256
smime.sh: #8891: Create Detached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #8892: Verifying Alice's Detached Signature (SHA256) . - PASSED
smime.sh: Signing Attached Message (SHA256) ------------------
cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256
smime.sh: #8893: Create Attached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256
smime.sh: #8894: Decode Alice's Attached Signature (SHA256) . - PASSED
diff alice.txt alice.data.SHA256
smime.sh: #8895: Compare Attached Signed Data and Original (SHA256) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------
cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256
smime.sh: #8896: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #8897: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------
cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256
smime.sh: #8898: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256
smime.sh: #8899: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED
diff alice.txt alice-ec.data.SHA256
smime.sh: #8900: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Detached Message {SHA384} ------------------
cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384
smime.sh: #8901: Create Detached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #8902: Verifying Alice's Detached Signature (SHA384) . - PASSED
smime.sh: Signing Attached Message (SHA384) ------------------
cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384
smime.sh: #8903: Create Attached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384
smime.sh: #8904: Decode Alice's Attached Signature (SHA384) . - PASSED
diff alice.txt alice.data.SHA384
smime.sh: #8905: Compare Attached Signed Data and Original (SHA384) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------
cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384
smime.sh: #8906: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #8907: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------
cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384
smime.sh: #8908: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384
smime.sh: #8909: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED
diff alice.txt alice-ec.data.SHA384
smime.sh: #8910: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Detached Message {SHA512} ------------------
cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512
smime.sh: #8911: Create Detached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #8912: Verifying Alice's Detached Signature (SHA512) . - PASSED
smime.sh: Signing Attached Message (SHA512) ------------------
cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512
smime.sh: #8913: Create Attached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512
smime.sh: #8914: Decode Alice's Attached Signature (SHA512) . - PASSED
diff alice.txt alice.data.SHA512
smime.sh: #8915: Compare Attached Signed Data and Original (SHA512) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------
cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512
smime.sh: #8916: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
smime.sh: #8917: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------
cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512
smime.sh: #8918: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512
smime.sh: #8919: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED
diff alice.txt alice-ec.data.SHA512
smime.sh: #8920: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED
smime.sh: Enveloped Data Tests ------------------------------
cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \
        -o alice.env
smime.sh: #8921: Create Enveloped Data Alice . - PASSED
cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1
smime.sh: #8922: Decode Enveloped Data Alice . - PASSED
diff alice.txt alice.data1
smime.sh: #8923: Compare Decoded Enveloped Data and Original . - PASSED
smime.sh: Testing multiple recipients ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \
        -r bob@bogus.com,dave@bogus.com
smime.sh: #8924: Create Multiple Recipients Enveloped Data Alice . - PASSED
smime.sh: Testing multiple email addrs ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \
        -r eve@bogus.net
smime.sh: #8925: Encrypt to a Multiple Email cert . - PASSED
cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2
smime.sh: #8926: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED
cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3
smime.sh: #8927: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED
cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4
smime.sh: #8928: Decrypt with a Multiple Email cert . - PASSED
smime.sh: #8929: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED
smime.sh: #8930: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED
smime.sh: #8931: Compare Decoded with Multiple Email cert . - PASSED
smime.sh: Sending CERTS-ONLY Message ------------------------------
cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \
        -d ../alicedir > co.der
smime.sh: #8932: Create Certs-Only Alice . - PASSED
cmsutil -D -i co.der -d ../bobdir
smime.sh: #8933: Verify Certs-Only by CA . - PASSED
smime.sh: Encrypted-Data Message ---------------------------------
cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \
        -r "bob@bogus.com" > alice.enc
smime.sh: #8934: Create Encrypted-Data . - PASSED
cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \
        -o alice.data2
smime.sh: #8935: Decode Encrypted-Data . - PASSED
smime.sh: #8936: Compare Decoded and Original Data . - PASSED
smime.sh: p7 util Data Tests ------------------------------
p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env
smime.sh: #8937: Creating envelope for user Alice . - PASSED
p7content -d ../alicedir -i alice.env -o alice_p7.data
smime.sh: #8938: Verifying file delivered to user Alice . - PASSED
diff alice.txt alice_p7.data.sed
smime.sh: #8939: Compare Decoded Enveloped Data and Original . - PASSED
p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e
smime.sh: #8940: Signing file for user Alice . - PASSED
p7verify -d ../alicedir -c alice.txt -s alice.sig
Signature is valid.
smime.sh: #8941: Verifying file delivered to user Alice . - PASSED
TIMESTAMP smime END: Tue Nov 27 19:31:06 EST 2012
Running tests for ssl
TIMESTAMP ssl BEGIN: Tue Nov 27 19:31:06 EST 2012
ssl.sh: SSL tests ===============================
ssl.sh: CRL SSL Client Tests   - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8186 >/dev/null 2>/dev/null
selfserv with PID 8186 found at Tue Nov 27 19:31:07 EST 2012
selfserv with PID 8186 started at Tue Nov 27 19:31:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8942: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8186 at Tue Nov 27 19:31:07 EST 2012
kill -USR1 8186
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8186 killed at Tue Nov 27 19:31:07 EST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8244 >/dev/null 2>/dev/null
selfserv with PID 8244 found at Tue Nov 27 19:31:07 EST 2012
selfserv with PID 8244 started at Tue Nov 27 19:31:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8943: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8244 at Tue Nov 27 19:31:09 EST 2012
kill -USR1 8244
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8244 killed at Tue Nov 27 19:31:09 EST 2012
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8302 >/dev/null 2>/dev/null
selfserv with PID 8302 found at Tue Nov 27 19:31:09 EST 2012
selfserv with PID 8302 started at Tue Nov 27 19:31:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8944: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8302 at Tue Nov 27 19:31:09 EST 2012
kill -USR1 8302
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8302 killed at Tue Nov 27 19:31:09 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:31:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8372 >/dev/null 2>/dev/null
selfserv with PID 8372 found at Tue Nov 27 19:31:09 EST 2012
selfserv with PID 8372 started at Tue Nov 27 19:31:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8945: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8372 at Tue Nov 27 19:31:10 EST 2012
kill -USR1 8372
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8372 killed at Tue Nov 27 19:31:10 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:31:10 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8430 >/dev/null 2>/dev/null
selfserv with PID 8430 found at Tue Nov 27 19:31:10 EST 2012
selfserv with PID 8430 started at Tue Nov 27 19:31:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8946: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8430 at Tue Nov 27 19:31:10 EST 2012
kill -USR1 8430
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8430 killed at Tue Nov 27 19:31:10 EST 2012
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:31:10 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8488 >/dev/null 2>/dev/null
selfserv with PID 8488 found at Tue Nov 27 19:31:10 EST 2012
selfserv with PID 8488 started at Tue Nov 27 19:31:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8947: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8488 at Tue Nov 27 19:31:10 EST 2012
kill -USR1 8488
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8488 killed at Tue Nov 27 19:31:10 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:31:10 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8558 >/dev/null 2>/dev/null
selfserv with PID 8558 found at Tue Nov 27 19:31:10 EST 2012
selfserv with PID 8558 started at Tue Nov 27 19:31:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8948: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 8558 at Tue Nov 27 19:31:11 EST 2012
kill -USR1 8558
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8558 killed at Tue Nov 27 19:31:11 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:31:11 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8616 >/dev/null 2>/dev/null
selfserv with PID 8616 found at Tue Nov 27 19:31:11 EST 2012
selfserv with PID 8616 started at Tue Nov 27 19:31:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8949: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8616 at Tue Nov 27 19:31:11 EST 2012
kill -USR1 8616
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8616 killed at Tue Nov 27 19:31:11 EST 2012
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:31:11 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8674 >/dev/null 2>/dev/null
selfserv with PID 8674 found at Tue Nov 27 19:31:11 EST 2012
selfserv with PID 8674 started at Tue Nov 27 19:31:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8950: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 8674 at Tue Nov 27 19:31:12 EST 2012
kill -USR1 8674
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8674 killed at Tue Nov 27 19:31:12 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:12 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8744 >/dev/null 2>/dev/null
selfserv with PID 8744 found at Tue Nov 27 19:31:12 EST 2012
selfserv with PID 8744 started at Tue Nov 27 19:31:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8951: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 8744 at Tue Nov 27 19:31:12 EST 2012
kill -USR1 8744
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8744 killed at Tue Nov 27 19:31:12 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:12 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8802 >/dev/null 2>/dev/null
selfserv with PID 8802 found at Tue Nov 27 19:31:12 EST 2012
selfserv with PID 8802 started at Tue Nov 27 19:31:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8952: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 8802 at Tue Nov 27 19:31:12 EST 2012
kill -USR1 8802
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8802 killed at Tue Nov 27 19:31:12 EST 2012
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:13 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8860 >/dev/null 2>/dev/null
selfserv with PID 8860 found at Tue Nov 27 19:31:13 EST 2012
selfserv with PID 8860 started at Tue Nov 27 19:31:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8953: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 8860 at Tue Nov 27 19:31:13 EST 2012
kill -USR1 8860
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8860 killed at Tue Nov 27 19:31:13 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:31:13 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8930 >/dev/null 2>/dev/null
selfserv with PID 8930 found at Tue Nov 27 19:31:13 EST 2012
selfserv with PID 8930 started at Tue Nov 27 19:31:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8954: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 8930 at Tue Nov 27 19:31:13 EST 2012
kill -USR1 8930
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8930 killed at Tue Nov 27 19:31:13 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:31:13 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8988 >/dev/null 2>/dev/null
selfserv with PID 8988 found at Tue Nov 27 19:31:13 EST 2012
selfserv with PID 8988 started at Tue Nov 27 19:31:13 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8955: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 8988 at Tue Nov 27 19:31:14 EST 2012
kill -USR1 8988
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8988 killed at Tue Nov 27 19:31:14 EST 2012
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:31:14 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9046 >/dev/null 2>/dev/null
selfserv with PID 9046 found at Tue Nov 27 19:31:14 EST 2012
selfserv with PID 9046 started at Tue Nov 27 19:31:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8956: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 9046 at Tue Nov 27 19:31:14 EST 2012
kill -USR1 9046
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9046 killed at Tue Nov 27 19:31:14 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:31:14 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9116 >/dev/null 2>/dev/null
selfserv with PID 9116 found at Tue Nov 27 19:31:14 EST 2012
selfserv with PID 9116 started at Tue Nov 27 19:31:14 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8957: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 9116 at Tue Nov 27 19:31:14 EST 2012
kill -USR1 9116
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9116 killed at Tue Nov 27 19:31:14 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:31:15 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9174 >/dev/null 2>/dev/null
selfserv with PID 9174 found at Tue Nov 27 19:31:15 EST 2012
selfserv with PID 9174 started at Tue Nov 27 19:31:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8958: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9174 at Tue Nov 27 19:31:15 EST 2012
kill -USR1 9174
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9174 killed at Tue Nov 27 19:31:15 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:31:15 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9232 >/dev/null 2>/dev/null
selfserv with PID 9232 found at Tue Nov 27 19:31:15 EST 2012
selfserv with PID 9232 started at Tue Nov 27 19:31:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8959: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 9232 at Tue Nov 27 19:31:15 EST 2012
kill -USR1 9232
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9232 killed at Tue Nov 27 19:31:15 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:15 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9302 >/dev/null 2>/dev/null
selfserv with PID 9302 found at Tue Nov 27 19:31:15 EST 2012
selfserv with PID 9302 started at Tue Nov 27 19:31:15 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8960: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9302 at Tue Nov 27 19:31:16 EST 2012
kill -USR1 9302
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9302 killed at Tue Nov 27 19:31:16 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:16 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9360 >/dev/null 2>/dev/null
selfserv with PID 9360 found at Tue Nov 27 19:31:16 EST 2012
selfserv with PID 9360 started at Tue Nov 27 19:31:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8961: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9360 at Tue Nov 27 19:31:16 EST 2012
kill -USR1 9360
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9360 killed at Tue Nov 27 19:31:16 EST 2012
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:16 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9418 >/dev/null 2>/dev/null
selfserv with PID 9418 found at Tue Nov 27 19:31:16 EST 2012
selfserv with PID 9418 started at Tue Nov 27 19:31:16 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8962: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9418 at Tue Nov 27 19:31:17 EST 2012
kill -USR1 9418
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9418 killed at Tue Nov 27 19:31:17 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:31:17 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9488 >/dev/null 2>/dev/null
selfserv with PID 9488 found at Tue Nov 27 19:31:17 EST 2012
selfserv with PID 9488 started at Tue Nov 27 19:31:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8963: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9488 at Tue Nov 27 19:31:17 EST 2012
kill -USR1 9488
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9488 killed at Tue Nov 27 19:31:17 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:31:17 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9546 >/dev/null 2>/dev/null
selfserv with PID 9546 found at Tue Nov 27 19:31:17 EST 2012
selfserv with PID 9546 started at Tue Nov 27 19:31:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8964: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9546 at Tue Nov 27 19:31:17 EST 2012
kill -USR1 9546
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9546 killed at Tue Nov 27 19:31:17 EST 2012
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:31:17 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9605 >/dev/null 2>/dev/null
selfserv with PID 9605 found at Tue Nov 27 19:31:17 EST 2012
selfserv with PID 9605 started at Tue Nov 27 19:31:17 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8965: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9605 at Tue Nov 27 19:31:18 EST 2012
kill -USR1 9605
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9605 killed at Tue Nov 27 19:31:18 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:31:18 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9675 >/dev/null 2>/dev/null
selfserv with PID 9675 found at Tue Nov 27 19:31:18 EST 2012
selfserv with PID 9675 started at Tue Nov 27 19:31:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8966: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 9675 at Tue Nov 27 19:31:18 EST 2012
kill -USR1 9675
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9675 killed at Tue Nov 27 19:31:18 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:31:18 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9733 >/dev/null 2>/dev/null
selfserv with PID 9733 found at Tue Nov 27 19:31:18 EST 2012
selfserv with PID 9733 started at Tue Nov 27 19:31:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8967: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9733 at Tue Nov 27 19:31:19 EST 2012
kill -USR1 9733
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9733 killed at Tue Nov 27 19:31:19 EST 2012
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:31:19 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9791 >/dev/null 2>/dev/null
selfserv with PID 9791 found at Tue Nov 27 19:31:19 EST 2012
selfserv with PID 9791 started at Tue Nov 27 19:31:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8968: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 9791 at Tue Nov 27 19:31:19 EST 2012
kill -USR1 9791
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9791 killed at Tue Nov 27 19:31:19 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:19 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9861 >/dev/null 2>/dev/null
selfserv with PID 9861 found at Tue Nov 27 19:31:19 EST 2012
selfserv with PID 9861 started at Tue Nov 27 19:31:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8969: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 9861 at Tue Nov 27 19:31:19 EST 2012
kill -USR1 9861
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9861 killed at Tue Nov 27 19:31:19 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:19 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9919 >/dev/null 2>/dev/null
selfserv with PID 9919 found at Tue Nov 27 19:31:19 EST 2012
selfserv with PID 9919 started at Tue Nov 27 19:31:19 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8970: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 9919 at Tue Nov 27 19:31:20 EST 2012
kill -USR1 9919
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9919 killed at Tue Nov 27 19:31:20 EST 2012
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:20 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9977 >/dev/null 2>/dev/null
selfserv with PID 9977 found at Tue Nov 27 19:31:20 EST 2012
selfserv with PID 9977 started at Tue Nov 27 19:31:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8971: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 9977 at Tue Nov 27 19:31:20 EST 2012
kill -USR1 9977
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9977 killed at Tue Nov 27 19:31:20 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:31:20 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10048 >/dev/null 2>/dev/null
selfserv with PID 10048 found at Tue Nov 27 19:31:20 EST 2012
selfserv with PID 10048 started at Tue Nov 27 19:31:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8972: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 10048 at Tue Nov 27 19:31:21 EST 2012
kill -USR1 10048
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10048 killed at Tue Nov 27 19:31:21 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:31:21 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10106 >/dev/null 2>/dev/null
selfserv with PID 10106 found at Tue Nov 27 19:31:21 EST 2012
selfserv with PID 10106 started at Tue Nov 27 19:31:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8973: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 10106 at Tue Nov 27 19:31:21 EST 2012
kill -USR1 10106
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10106 killed at Tue Nov 27 19:31:21 EST 2012
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Tue Nov 27 19:31:21 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10164 >/dev/null 2>/dev/null
selfserv with PID 10164 found at Tue Nov 27 19:31:21 EST 2012
selfserv with PID 10164 started at Tue Nov 27 19:31:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #8974: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 10164 at Tue Nov 27 19:31:21 EST 2012
kill -USR1 10164
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10164 killed at Tue Nov 27 19:31:21 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:31:21 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10234 >/dev/null 2>/dev/null
selfserv with PID 10234 found at Tue Nov 27 19:31:21 EST 2012
selfserv with PID 10234 started at Tue Nov 27 19:31:21 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8975: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 10234 at Tue Nov 27 19:31:22 EST 2012
kill -USR1 10234
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10234 killed at Tue Nov 27 19:31:22 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:31:22 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10292 >/dev/null 2>/dev/null
selfserv with PID 10292 found at Tue Nov 27 19:31:22 EST 2012
selfserv with PID 10292 started at Tue Nov 27 19:31:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8976: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10292 at Tue Nov 27 19:31:22 EST 2012
kill -USR1 10292
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10292 killed at Tue Nov 27 19:31:22 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:31:22 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10350 >/dev/null 2>/dev/null
selfserv with PID 10350 found at Tue Nov 27 19:31:22 EST 2012
selfserv with PID 10350 started at Tue Nov 27 19:31:22 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #8977: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 10350 at Tue Nov 27 19:31:23 EST 2012
kill -USR1 10350
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10350 killed at Tue Nov 27 19:31:23 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:23 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10420 >/dev/null 2>/dev/null
selfserv with PID 10420 found at Tue Nov 27 19:31:23 EST 2012
selfserv with PID 10420 started at Tue Nov 27 19:31:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8978: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10420 at Tue Nov 27 19:31:23 EST 2012
kill -USR1 10420
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10420 killed at Tue Nov 27 19:31:23 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:23 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10478 >/dev/null 2>/dev/null
selfserv with PID 10478 found at Tue Nov 27 19:31:23 EST 2012
selfserv with PID 10478 started at Tue Nov 27 19:31:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8979: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10478 at Tue Nov 27 19:31:23 EST 2012
kill -USR1 10478
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10478 killed at Tue Nov 27 19:31:23 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:23 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10536 >/dev/null 2>/dev/null
selfserv with PID 10536 found at Tue Nov 27 19:31:23 EST 2012
selfserv with PID 10536 started at Tue Nov 27 19:31:23 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8980: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10536 at Tue Nov 27 19:31:24 EST 2012
kill -USR1 10536
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10536 killed at Tue Nov 27 19:31:24 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:31:24 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10607 >/dev/null 2>/dev/null
selfserv with PID 10607 found at Tue Nov 27 19:31:24 EST 2012
selfserv with PID 10607 started at Tue Nov 27 19:31:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8981: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10607 at Tue Nov 27 19:31:24 EST 2012
kill -USR1 10607
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10607 killed at Tue Nov 27 19:31:24 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:31:24 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10665 >/dev/null 2>/dev/null
selfserv with PID 10665 found at Tue Nov 27 19:31:24 EST 2012
selfserv with PID 10665 started at Tue Nov 27 19:31:24 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8982: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10665 at Tue Nov 27 19:31:25 EST 2012
kill -USR1 10665
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10665 killed at Tue Nov 27 19:31:25 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:31:25 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10723 >/dev/null 2>/dev/null
selfserv with PID 10723 found at Tue Nov 27 19:31:25 EST 2012
selfserv with PID 10723 started at Tue Nov 27 19:31:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8983: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10723 at Tue Nov 27 19:31:25 EST 2012
kill -USR1 10723
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10723 killed at Tue Nov 27 19:31:25 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:31:25 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10793 >/dev/null 2>/dev/null
selfserv with PID 10793 found at Tue Nov 27 19:31:25 EST 2012
selfserv with PID 10793 started at Tue Nov 27 19:31:25 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8984: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10793 at Tue Nov 27 19:31:26 EST 2012
kill -USR1 10793
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10793 killed at Tue Nov 27 19:31:26 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:31:26 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10851 >/dev/null 2>/dev/null
selfserv with PID 10851 found at Tue Nov 27 19:31:26 EST 2012
selfserv with PID 10851 started at Tue Nov 27 19:31:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8985: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10851 at Tue Nov 27 19:31:26 EST 2012
kill -USR1 10851
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10851 killed at Tue Nov 27 19:31:26 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:31:26 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10909 >/dev/null 2>/dev/null
selfserv with PID 10909 found at Tue Nov 27 19:31:26 EST 2012
selfserv with PID 10909 started at Tue Nov 27 19:31:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8986: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10909 at Tue Nov 27 19:31:26 EST 2012
kill -USR1 10909
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10909 killed at Tue Nov 27 19:31:26 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:26 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10980 >/dev/null 2>/dev/null
selfserv with PID 10980 found at Tue Nov 27 19:31:26 EST 2012
selfserv with PID 10980 started at Tue Nov 27 19:31:26 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8987: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10980 at Tue Nov 27 19:31:27 EST 2012
kill -USR1 10980
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10980 killed at Tue Nov 27 19:31:27 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:27 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11038 >/dev/null 2>/dev/null
selfserv with PID 11038 found at Tue Nov 27 19:31:27 EST 2012
selfserv with PID 11038 started at Tue Nov 27 19:31:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8988: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11038 at Tue Nov 27 19:31:27 EST 2012
kill -USR1 11038
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11038 killed at Tue Nov 27 19:31:27 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:27 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11096 >/dev/null 2>/dev/null
selfserv with PID 11096 found at Tue Nov 27 19:31:27 EST 2012
selfserv with PID 11096 started at Tue Nov 27 19:31:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8989: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11096 at Tue Nov 27 19:31:28 EST 2012
kill -USR1 11096
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11096 killed at Tue Nov 27 19:31:28 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:31:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11166 >/dev/null 2>/dev/null
selfserv with PID 11166 found at Tue Nov 27 19:31:28 EST 2012
selfserv with PID 11166 started at Tue Nov 27 19:31:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8990: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11166 at Tue Nov 27 19:31:28 EST 2012
kill -USR1 11166
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11166 killed at Tue Nov 27 19:31:28 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:31:28 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11224 >/dev/null 2>/dev/null
selfserv with PID 11224 found at Tue Nov 27 19:31:28 EST 2012
selfserv with PID 11224 started at Tue Nov 27 19:31:28 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8991: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11224 at Tue Nov 27 19:31:28 EST 2012
kill -USR1 11224
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11224 killed at Tue Nov 27 19:31:28 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:31:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11282 >/dev/null 2>/dev/null
selfserv with PID 11282 found at Tue Nov 27 19:31:29 EST 2012
selfserv with PID 11282 started at Tue Nov 27 19:31:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #8992: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11282 at Tue Nov 27 19:31:29 EST 2012
kill -USR1 11282
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11282 killed at Tue Nov 27 19:31:29 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:31:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11352 >/dev/null 2>/dev/null
selfserv with PID 11352 found at Tue Nov 27 19:31:29 EST 2012
selfserv with PID 11352 started at Tue Nov 27 19:31:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8993: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11352 at Tue Nov 27 19:31:29 EST 2012
kill -USR1 11352
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11352 killed at Tue Nov 27 19:31:29 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:31:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11410 >/dev/null 2>/dev/null
selfserv with PID 11410 found at Tue Nov 27 19:31:29 EST 2012
selfserv with PID 11410 started at Tue Nov 27 19:31:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8994: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11410 at Tue Nov 27 19:31:30 EST 2012
kill -USR1 11410
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11410 killed at Tue Nov 27 19:31:30 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:31:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11468 >/dev/null 2>/dev/null
selfserv with PID 11468 found at Tue Nov 27 19:31:30 EST 2012
selfserv with PID 11468 started at Tue Nov 27 19:31:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #8995: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11468 at Tue Nov 27 19:31:30 EST 2012
kill -USR1 11468
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11468 killed at Tue Nov 27 19:31:30 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11538 >/dev/null 2>/dev/null
selfserv with PID 11538 found at Tue Nov 27 19:31:30 EST 2012
selfserv with PID 11538 started at Tue Nov 27 19:31:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8996: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11538 at Tue Nov 27 19:31:31 EST 2012
kill -USR1 11538
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11538 killed at Tue Nov 27 19:31:31 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:31 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11596 >/dev/null 2>/dev/null
selfserv with PID 11596 found at Tue Nov 27 19:31:31 EST 2012
selfserv with PID 11596 started at Tue Nov 27 19:31:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8997: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11596 at Tue Nov 27 19:31:31 EST 2012
kill -USR1 11596
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11596 killed at Tue Nov 27 19:31:31 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:31 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11656 >/dev/null 2>/dev/null
selfserv with PID 11656 found at Tue Nov 27 19:31:31 EST 2012
selfserv with PID 11656 started at Tue Nov 27 19:31:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8998: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11656 at Tue Nov 27 19:31:31 EST 2012
kill -USR1 11656
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11656 killed at Tue Nov 27 19:31:31 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:31:31 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11726 >/dev/null 2>/dev/null
selfserv with PID 11726 found at Tue Nov 27 19:31:31 EST 2012
selfserv with PID 11726 started at Tue Nov 27 19:31:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #8999: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11726 at Tue Nov 27 19:31:32 EST 2012
kill -USR1 11726
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11726 killed at Tue Nov 27 19:31:32 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:31:32 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11786 >/dev/null 2>/dev/null
selfserv with PID 11786 found at Tue Nov 27 19:31:32 EST 2012
selfserv with PID 11786 started at Tue Nov 27 19:31:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9000: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11786 at Tue Nov 27 19:31:32 EST 2012
kill -USR1 11786
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11786 killed at Tue Nov 27 19:31:32 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:31:32 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11844 >/dev/null 2>/dev/null
selfserv with PID 11844 found at Tue Nov 27 19:31:32 EST 2012
selfserv with PID 11844 started at Tue Nov 27 19:31:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9001: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11844 at Tue Nov 27 19:31:33 EST 2012
kill -USR1 11844
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11844 killed at Tue Nov 27 19:31:33 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:31:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11915 >/dev/null 2>/dev/null
selfserv with PID 11915 found at Tue Nov 27 19:31:33 EST 2012
selfserv with PID 11915 started at Tue Nov 27 19:31:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #9002: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11915 at Tue Nov 27 19:31:33 EST 2012
kill -USR1 11915
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11915 killed at Tue Nov 27 19:31:33 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:31:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11973 >/dev/null 2>/dev/null
selfserv with PID 11973 found at Tue Nov 27 19:31:33 EST 2012
selfserv with PID 11973 started at Tue Nov 27 19:31:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9003: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11973 at Tue Nov 27 19:31:33 EST 2012
kill -USR1 11973
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11973 killed at Tue Nov 27 19:31:33 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:31:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12031 >/dev/null 2>/dev/null
selfserv with PID 12031 found at Tue Nov 27 19:31:34 EST 2012
selfserv with PID 12031 started at Tue Nov 27 19:31:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #9004: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12031 at Tue Nov 27 19:31:34 EST 2012
kill -USR1 12031
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12031 killed at Tue Nov 27 19:31:34 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12101 >/dev/null 2>/dev/null
selfserv with PID 12101 found at Tue Nov 27 19:31:34 EST 2012
selfserv with PID 12101 started at Tue Nov 27 19:31:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #9005: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12101 at Tue Nov 27 19:31:34 EST 2012
kill -USR1 12101
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12101 killed at Tue Nov 27 19:31:34 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12159 >/dev/null 2>/dev/null
selfserv with PID 12159 found at Tue Nov 27 19:31:34 EST 2012
selfserv with PID 12159 started at Tue Nov 27 19:31:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #9006: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12159 at Tue Nov 27 19:31:35 EST 2012
kill -USR1 12159
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12159 killed at Tue Nov 27 19:31:35 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12217 >/dev/null 2>/dev/null
selfserv with PID 12217 found at Tue Nov 27 19:31:35 EST 2012
selfserv with PID 12217 started at Tue Nov 27 19:31:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #9007: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12217 at Tue Nov 27 19:31:35 EST 2012
kill -USR1 12217
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12217 killed at Tue Nov 27 19:31:35 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:31:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12287 >/dev/null 2>/dev/null
selfserv with PID 12287 found at Tue Nov 27 19:31:35 EST 2012
selfserv with PID 12287 started at Tue Nov 27 19:31:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #9008: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12287 at Tue Nov 27 19:31:36 EST 2012
kill -USR1 12287
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12287 killed at Tue Nov 27 19:31:36 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:31:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12346 >/dev/null 2>/dev/null
selfserv with PID 12346 found at Tue Nov 27 19:31:36 EST 2012
selfserv with PID 12346 started at Tue Nov 27 19:31:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #9009: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12346 at Tue Nov 27 19:31:36 EST 2012
kill -USR1 12346
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12346 killed at Tue Nov 27 19:31:36 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:31:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12406 >/dev/null 2>/dev/null
selfserv with PID 12406 found at Tue Nov 27 19:31:36 EST 2012
selfserv with PID 12406 started at Tue Nov 27 19:31:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #9010: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12406 at Tue Nov 27 19:31:36 EST 2012
kill -USR1 12406
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12406 killed at Tue Nov 27 19:31:36 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:31:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12476 >/dev/null 2>/dev/null
selfserv with PID 12476 found at Tue Nov 27 19:31:36 EST 2012
selfserv with PID 12476 started at Tue Nov 27 19:31:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #9011: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12476 at Tue Nov 27 19:31:37 EST 2012
kill -USR1 12476
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12476 killed at Tue Nov 27 19:31:37 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:31:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12534 >/dev/null 2>/dev/null
selfserv with PID 12534 found at Tue Nov 27 19:31:37 EST 2012
selfserv with PID 12534 started at Tue Nov 27 19:31:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9012: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12534 at Tue Nov 27 19:31:37 EST 2012
kill -USR1 12534
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12534 killed at Tue Nov 27 19:31:37 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:31:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12592 >/dev/null 2>/dev/null
selfserv with PID 12592 found at Tue Nov 27 19:31:37 EST 2012
selfserv with PID 12592 started at Tue Nov 27 19:31:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #9013: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12592 at Tue Nov 27 19:31:38 EST 2012
kill -USR1 12592
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12592 killed at Tue Nov 27 19:31:38 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12662 >/dev/null 2>/dev/null
selfserv with PID 12662 found at Tue Nov 27 19:31:38 EST 2012
selfserv with PID 12662 started at Tue Nov 27 19:31:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9014: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12662 at Tue Nov 27 19:31:38 EST 2012
kill -USR1 12662
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12662 killed at Tue Nov 27 19:31:38 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12720 >/dev/null 2>/dev/null
selfserv with PID 12720 found at Tue Nov 27 19:31:38 EST 2012
selfserv with PID 12720 started at Tue Nov 27 19:31:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9015: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12720 at Tue Nov 27 19:31:39 EST 2012
kill -USR1 12720
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12720 killed at Tue Nov 27 19:31:39 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12778 >/dev/null 2>/dev/null
selfserv with PID 12778 found at Tue Nov 27 19:31:39 EST 2012
selfserv with PID 12778 started at Tue Nov 27 19:31:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9016: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12778 at Tue Nov 27 19:31:39 EST 2012
kill -USR1 12778
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12778 killed at Tue Nov 27 19:31:39 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:31:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12848 >/dev/null 2>/dev/null
selfserv with PID 12848 found at Tue Nov 27 19:31:39 EST 2012
selfserv with PID 12848 started at Tue Nov 27 19:31:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9017: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12848 at Tue Nov 27 19:31:39 EST 2012
kill -USR1 12848
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12848 killed at Tue Nov 27 19:31:39 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:31:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12906 >/dev/null 2>/dev/null
selfserv with PID 12906 found at Tue Nov 27 19:31:39 EST 2012
selfserv with PID 12906 started at Tue Nov 27 19:31:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9018: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12906 at Tue Nov 27 19:31:40 EST 2012
kill -USR1 12906
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12906 killed at Tue Nov 27 19:31:40 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:31:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12964 >/dev/null 2>/dev/null
selfserv with PID 12964 found at Tue Nov 27 19:31:40 EST 2012
selfserv with PID 12964 started at Tue Nov 27 19:31:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9019: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12964 at Tue Nov 27 19:31:40 EST 2012
kill -USR1 12964
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12964 killed at Tue Nov 27 19:31:40 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:31:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13034 >/dev/null 2>/dev/null
selfserv with PID 13034 found at Tue Nov 27 19:31:40 EST 2012
selfserv with PID 13034 started at Tue Nov 27 19:31:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #9020: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13034 at Tue Nov 27 19:31:41 EST 2012
kill -USR1 13034
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13034 killed at Tue Nov 27 19:31:41 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:31:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13092 >/dev/null 2>/dev/null
selfserv with PID 13092 found at Tue Nov 27 19:31:41 EST 2012
selfserv with PID 13092 started at Tue Nov 27 19:31:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9021: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13092 at Tue Nov 27 19:31:41 EST 2012
kill -USR1 13092
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13092 killed at Tue Nov 27 19:31:41 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:31:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13150 >/dev/null 2>/dev/null
selfserv with PID 13150 found at Tue Nov 27 19:31:41 EST 2012
selfserv with PID 13150 started at Tue Nov 27 19:31:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #9022: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13150 at Tue Nov 27 19:31:42 EST 2012
kill -USR1 13150
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13150 killed at Tue Nov 27 19:31:42 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13220 >/dev/null 2>/dev/null
selfserv with PID 13220 found at Tue Nov 27 19:31:42 EST 2012
selfserv with PID 13220 started at Tue Nov 27 19:31:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #9023: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13220 at Tue Nov 27 19:31:42 EST 2012
kill -USR1 13220
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13220 killed at Tue Nov 27 19:31:42 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13278 >/dev/null 2>/dev/null
selfserv with PID 13278 found at Tue Nov 27 19:31:42 EST 2012
selfserv with PID 13278 started at Tue Nov 27 19:31:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #9024: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13278 at Tue Nov 27 19:31:42 EST 2012
kill -USR1 13278
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13278 killed at Tue Nov 27 19:31:42 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Tue Nov 27 19:31:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13336 >/dev/null 2>/dev/null
selfserv with PID 13336 found at Tue Nov 27 19:31:43 EST 2012
selfserv with PID 13336 started at Tue Nov 27 19:31:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -w nss -n none  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #9025: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13336 at Tue Nov 27 19:31:43 EST 2012
kill -USR1 13336
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13336 killed at Tue Nov 27 19:31:43 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:31:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13406 >/dev/null 2>/dev/null
selfserv with PID 13406 found at Tue Nov 27 19:31:43 EST 2012
selfserv with PID 13406 started at Tue Nov 27 19:31:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #9026: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13406 at Tue Nov 27 19:31:43 EST 2012
kill -USR1 13406
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13406 killed at Tue Nov 27 19:31:43 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:31:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13464 >/dev/null 2>/dev/null
selfserv with PID 13464 found at Tue Nov 27 19:31:43 EST 2012
selfserv with PID 13464 started at Tue Nov 27 19:31:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #9027: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13464 at Tue Nov 27 19:31:44 EST 2012
kill -USR1 13464
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13464 killed at Tue Nov 27 19:31:44 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Tue Nov 27 19:31:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13522 >/dev/null 2>/dev/null
selfserv with PID 13522 found at Tue Nov 27 19:31:44 EST 2012
selfserv with PID 13522 started at Tue Nov 27 19:31:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #9028: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13522 at Tue Nov 27 19:31:44 EST 2012
kill -USR1 13522
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13522 killed at Tue Nov 27 19:31:44 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:31:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13592 >/dev/null 2>/dev/null
selfserv with PID 13592 found at Tue Nov 27 19:31:44 EST 2012
selfserv with PID 13592 started at Tue Nov 27 19:31:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #9029: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13592 at Tue Nov 27 19:31:45 EST 2012
kill -USR1 13592
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13592 killed at Tue Nov 27 19:31:45 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:31:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13650 >/dev/null 2>/dev/null
selfserv with PID 13650 found at Tue Nov 27 19:31:45 EST 2012
selfserv with PID 13650 started at Tue Nov 27 19:31:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9030: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13650 at Tue Nov 27 19:31:45 EST 2012
kill -USR1 13650
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13650 killed at Tue Nov 27 19:31:45 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:31:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13708 >/dev/null 2>/dev/null
selfserv with PID 13708 found at Tue Nov 27 19:31:45 EST 2012
selfserv with PID 13708 started at Tue Nov 27 19:31:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #9031: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13708 at Tue Nov 27 19:31:45 EST 2012
kill -USR1 13708
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13708 killed at Tue Nov 27 19:31:45 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:31:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13787 >/dev/null 2>/dev/null
selfserv with PID 13787 found at Tue Nov 27 19:31:45 EST 2012
selfserv with PID 13787 started at Tue Nov 27 19:31:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9032: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13787 at Tue Nov 27 19:31:46 EST 2012
kill -USR1 13787
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13787 killed at Tue Nov 27 19:31:46 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:31:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13845 >/dev/null 2>/dev/null
selfserv with PID 13845 found at Tue Nov 27 19:31:46 EST 2012
selfserv with PID 13845 started at Tue Nov 27 19:31:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9033: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13845 at Tue Nov 27 19:31:46 EST 2012
kill -USR1 13845
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13845 killed at Tue Nov 27 19:31:46 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:31:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13903 >/dev/null 2>/dev/null
selfserv with PID 13903 found at Tue Nov 27 19:31:46 EST 2012
selfserv with PID 13903 started at Tue Nov 27 19:31:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9034: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13903 at Tue Nov 27 19:31:47 EST 2012
kill -USR1 13903
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13903 killed at Tue Nov 27 19:31:47 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:31:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13973 >/dev/null 2>/dev/null
selfserv with PID 13973 found at Tue Nov 27 19:31:47 EST 2012
selfserv with PID 13973 started at Tue Nov 27 19:31:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #9035: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 13973 at Tue Nov 27 19:31:47 EST 2012
kill -USR1 13973
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13973 killed at Tue Nov 27 19:31:47 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:31:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14031 >/dev/null 2>/dev/null
selfserv with PID 14031 found at Tue Nov 27 19:31:47 EST 2012
selfserv with PID 14031 started at Tue Nov 27 19:31:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9036: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14031 at Tue Nov 27 19:31:48 EST 2012
kill -USR1 14031
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14031 killed at Tue Nov 27 19:31:48 EST 2012
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:31:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14089 >/dev/null 2>/dev/null
selfserv with PID 14089 found at Tue Nov 27 19:31:48 EST 2012
selfserv with PID 14089 started at Tue Nov 27 19:31:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #9037: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 14089 at Tue Nov 27 19:31:48 EST 2012
kill -USR1 14089
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14089 killed at Tue Nov 27 19:31:48 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:31:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14159 >/dev/null 2>/dev/null
selfserv with PID 14159 found at Tue Nov 27 19:31:48 EST 2012
selfserv with PID 14159 started at Tue Nov 27 19:31:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #9038: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 14159 at Tue Nov 27 19:31:48 EST 2012
kill -USR1 14159
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14159 killed at Tue Nov 27 19:31:48 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:31:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14217 >/dev/null 2>/dev/null
selfserv with PID 14217 found at Tue Nov 27 19:31:48 EST 2012
selfserv with PID 14217 started at Tue Nov 27 19:31:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #9039: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 14217 at Tue Nov 27 19:31:49 EST 2012
kill -USR1 14217
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14217 killed at Tue Nov 27 19:31:49 EST 2012
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:31:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14276 >/dev/null 2>/dev/null
selfserv with PID 14276 found at Tue Nov 27 19:31:49 EST 2012
selfserv with PID 14276 started at Tue Nov 27 19:31:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #9040: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 14276 at Tue Nov 27 19:31:49 EST 2012
kill -USR1 14276
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14276 killed at Tue Nov 27 19:31:49 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:31:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14346 >/dev/null 2>/dev/null
selfserv with PID 14346 found at Tue Nov 27 19:31:49 EST 2012
selfserv with PID 14346 started at Tue Nov 27 19:31:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #9041: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 14346 at Tue Nov 27 19:31:50 EST 2012
kill -USR1 14346
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14346 killed at Tue Nov 27 19:31:50 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:31:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14404 >/dev/null 2>/dev/null
selfserv with PID 14404 found at Tue Nov 27 19:31:50 EST 2012
selfserv with PID 14404 started at Tue Nov 27 19:31:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9042: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14404 at Tue Nov 27 19:31:50 EST 2012
kill -USR1 14404
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14404 killed at Tue Nov 27 19:31:50 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:31:50 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14462 >/dev/null 2>/dev/null
selfserv with PID 14462 found at Tue Nov 27 19:31:50 EST 2012
selfserv with PID 14462 started at Tue Nov 27 19:31:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #9043: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 14462 at Tue Nov 27 19:31:51 EST 2012
kill -USR1 14462
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14462 killed at Tue Nov 27 19:31:51 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:31:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14532 >/dev/null 2>/dev/null
selfserv with PID 14532 found at Tue Nov 27 19:31:51 EST 2012
selfserv with PID 14532 started at Tue Nov 27 19:31:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9044: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14532 at Tue Nov 27 19:31:51 EST 2012
kill -USR1 14532
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14532 killed at Tue Nov 27 19:31:51 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:31:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14590 >/dev/null 2>/dev/null
selfserv with PID 14590 found at Tue Nov 27 19:31:51 EST 2012
selfserv with PID 14590 started at Tue Nov 27 19:31:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9045: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14590 at Tue Nov 27 19:31:51 EST 2012
kill -USR1 14590
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14590 killed at Tue Nov 27 19:31:51 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:31:51 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14648 >/dev/null 2>/dev/null
selfserv with PID 14648 found at Tue Nov 27 19:31:51 EST 2012
selfserv with PID 14648 started at Tue Nov 27 19:31:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9046: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14648 at Tue Nov 27 19:31:52 EST 2012
kill -USR1 14648
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14648 killed at Tue Nov 27 19:31:52 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:31:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14718 >/dev/null 2>/dev/null
selfserv with PID 14718 found at Tue Nov 27 19:31:52 EST 2012
selfserv with PID 14718 started at Tue Nov 27 19:31:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #9047: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 14718 at Tue Nov 27 19:31:52 EST 2012
kill -USR1 14718
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14718 killed at Tue Nov 27 19:31:52 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:31:52 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14776 >/dev/null 2>/dev/null
selfserv with PID 14776 found at Tue Nov 27 19:31:52 EST 2012
selfserv with PID 14776 started at Tue Nov 27 19:31:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9048: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14776 at Tue Nov 27 19:31:53 EST 2012
kill -USR1 14776
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14776 killed at Tue Nov 27 19:31:53 EST 2012
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:31:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14834 >/dev/null 2>/dev/null
selfserv with PID 14834 found at Tue Nov 27 19:31:53 EST 2012
selfserv with PID 14834 started at Tue Nov 27 19:31:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #9049: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 14834 at Tue Nov 27 19:31:53 EST 2012
kill -USR1 14834
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14834 killed at Tue Nov 27 19:31:53 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:31:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14904 >/dev/null 2>/dev/null
selfserv with PID 14904 found at Tue Nov 27 19:31:53 EST 2012
selfserv with PID 14904 started at Tue Nov 27 19:31:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #9050: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 14904 at Tue Nov 27 19:31:54 EST 2012
kill -USR1 14904
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14904 killed at Tue Nov 27 19:31:54 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:31:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 14962 >/dev/null 2>/dev/null
selfserv with PID 14962 found at Tue Nov 27 19:31:54 EST 2012
selfserv with PID 14962 started at Tue Nov 27 19:31:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #9051: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 14962 at Tue Nov 27 19:31:54 EST 2012
kill -USR1 14962
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 14962 killed at Tue Nov 27 19:31:54 EST 2012
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:31:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15020 >/dev/null 2>/dev/null
selfserv with PID 15020 found at Tue Nov 27 19:31:54 EST 2012
selfserv with PID 15020 started at Tue Nov 27 19:31:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #9052: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 15020 at Tue Nov 27 19:31:54 EST 2012
kill -USR1 15020
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15020 killed at Tue Nov 27 19:31:54 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:31:54 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15090 >/dev/null 2>/dev/null
selfserv with PID 15090 found at Tue Nov 27 19:31:54 EST 2012
selfserv with PID 15090 started at Tue Nov 27 19:31:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #9053: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 15090 at Tue Nov 27 19:31:55 EST 2012
kill -USR1 15090
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15090 killed at Tue Nov 27 19:31:55 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:31:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15148 >/dev/null 2>/dev/null
selfserv with PID 15148 found at Tue Nov 27 19:31:55 EST 2012
selfserv with PID 15148 started at Tue Nov 27 19:31:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9054: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15148 at Tue Nov 27 19:31:55 EST 2012
kill -USR1 15148
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15148 killed at Tue Nov 27 19:31:55 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:31:55 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15206 >/dev/null 2>/dev/null
selfserv with PID 15206 found at Tue Nov 27 19:31:55 EST 2012
selfserv with PID 15206 started at Tue Nov 27 19:31:55 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #9055: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 15206 at Tue Nov 27 19:31:56 EST 2012
kill -USR1 15206
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15206 killed at Tue Nov 27 19:31:56 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:31:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15276 >/dev/null 2>/dev/null
selfserv with PID 15276 found at Tue Nov 27 19:31:56 EST 2012
selfserv with PID 15276 started at Tue Nov 27 19:31:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9056: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15276 at Tue Nov 27 19:31:56 EST 2012
kill -USR1 15276
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15276 killed at Tue Nov 27 19:31:56 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:31:56 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15334 >/dev/null 2>/dev/null
selfserv with PID 15334 found at Tue Nov 27 19:31:56 EST 2012
selfserv with PID 15334 started at Tue Nov 27 19:31:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9057: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15334 at Tue Nov 27 19:31:57 EST 2012
kill -USR1 15334
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15334 killed at Tue Nov 27 19:31:57 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:31:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15392 >/dev/null 2>/dev/null
selfserv with PID 15392 found at Tue Nov 27 19:31:57 EST 2012
selfserv with PID 15392 started at Tue Nov 27 19:31:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9058: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15392 at Tue Nov 27 19:31:57 EST 2012
kill -USR1 15392
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15392 killed at Tue Nov 27 19:31:57 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:31:57 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15462 >/dev/null 2>/dev/null
selfserv with PID 15462 found at Tue Nov 27 19:31:57 EST 2012
selfserv with PID 15462 started at Tue Nov 27 19:31:57 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #9059: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15462 at Tue Nov 27 19:31:58 EST 2012
kill -USR1 15462
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15462 killed at Tue Nov 27 19:31:58 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:31:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15520 >/dev/null 2>/dev/null
selfserv with PID 15520 found at Tue Nov 27 19:31:58 EST 2012
selfserv with PID 15520 started at Tue Nov 27 19:31:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9060: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15520 at Tue Nov 27 19:31:58 EST 2012
kill -USR1 15520
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15520 killed at Tue Nov 27 19:31:58 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:31:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15578 >/dev/null 2>/dev/null
selfserv with PID 15578 found at Tue Nov 27 19:31:58 EST 2012
selfserv with PID 15578 started at Tue Nov 27 19:31:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #9061: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15578 at Tue Nov 27 19:31:58 EST 2012
kill -USR1 15578
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15578 killed at Tue Nov 27 19:31:58 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:31:58 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15648 >/dev/null 2>/dev/null
selfserv with PID 15648 found at Tue Nov 27 19:31:59 EST 2012
selfserv with PID 15648 started at Tue Nov 27 19:31:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #9062: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15648 at Tue Nov 27 19:31:59 EST 2012
kill -USR1 15648
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15648 killed at Tue Nov 27 19:31:59 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:31:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15706 >/dev/null 2>/dev/null
selfserv with PID 15706 found at Tue Nov 27 19:31:59 EST 2012
selfserv with PID 15706 started at Tue Nov 27 19:31:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #9063: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15706 at Tue Nov 27 19:31:59 EST 2012
kill -USR1 15706
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15706 killed at Tue Nov 27 19:31:59 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:31:59 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:31:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15764 >/dev/null 2>/dev/null
selfserv with PID 15764 found at Tue Nov 27 19:31:59 EST 2012
selfserv with PID 15764 started at Tue Nov 27 19:31:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #9064: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15764 at Tue Nov 27 19:32:00 EST 2012
kill -USR1 15764
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15764 killed at Tue Nov 27 19:32:00 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:32:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15834 >/dev/null 2>/dev/null
selfserv with PID 15834 found at Tue Nov 27 19:32:00 EST 2012
selfserv with PID 15834 started at Tue Nov 27 19:32:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #9065: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15834 at Tue Nov 27 19:32:00 EST 2012
kill -USR1 15834
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15834 killed at Tue Nov 27 19:32:00 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:32:00 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15892 >/dev/null 2>/dev/null
selfserv with PID 15892 found at Tue Nov 27 19:32:00 EST 2012
selfserv with PID 15892 started at Tue Nov 27 19:32:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9066: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15892 at Tue Nov 27 19:32:01 EST 2012
kill -USR1 15892
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15892 killed at Tue Nov 27 19:32:01 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:32:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 15950 >/dev/null 2>/dev/null
selfserv with PID 15950 found at Tue Nov 27 19:32:01 EST 2012
selfserv with PID 15950 started at Tue Nov 27 19:32:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #9067: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 15950 at Tue Nov 27 19:32:01 EST 2012
kill -USR1 15950
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 15950 killed at Tue Nov 27 19:32:01 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:32:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16028 >/dev/null 2>/dev/null
selfserv with PID 16028 found at Tue Nov 27 19:32:01 EST 2012
selfserv with PID 16028 started at Tue Nov 27 19:32:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9068: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16028 at Tue Nov 27 19:32:02 EST 2012
kill -USR1 16028
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16028 killed at Tue Nov 27 19:32:02 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:32:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16088 >/dev/null 2>/dev/null
selfserv with PID 16088 found at Tue Nov 27 19:32:02 EST 2012
selfserv with PID 16088 started at Tue Nov 27 19:32:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9069: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16088 at Tue Nov 27 19:32:02 EST 2012
kill -USR1 16088
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16088 killed at Tue Nov 27 19:32:02 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:32:02 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16146 >/dev/null 2>/dev/null
selfserv with PID 16146 found at Tue Nov 27 19:32:02 EST 2012
selfserv with PID 16146 started at Tue Nov 27 19:32:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9070: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16146 at Tue Nov 27 19:32:02 EST 2012
kill -USR1 16146
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16146 killed at Tue Nov 27 19:32:02 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:32:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16216 >/dev/null 2>/dev/null
selfserv with PID 16216 found at Tue Nov 27 19:32:03 EST 2012
selfserv with PID 16216 started at Tue Nov 27 19:32:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #9071: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16216 at Tue Nov 27 19:32:03 EST 2012
kill -USR1 16216
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16216 killed at Tue Nov 27 19:32:03 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:32:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16274 >/dev/null 2>/dev/null
selfserv with PID 16274 found at Tue Nov 27 19:32:03 EST 2012
selfserv with PID 16274 started at Tue Nov 27 19:32:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9072: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16274 at Tue Nov 27 19:32:03 EST 2012
kill -USR1 16274
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16274 killed at Tue Nov 27 19:32:03 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:32:03 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16332 >/dev/null 2>/dev/null
selfserv with PID 16332 found at Tue Nov 27 19:32:03 EST 2012
selfserv with PID 16332 started at Tue Nov 27 19:32:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #9073: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16332 at Tue Nov 27 19:32:04 EST 2012
kill -USR1 16332
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16332 killed at Tue Nov 27 19:32:04 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:32:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16403 >/dev/null 2>/dev/null
selfserv with PID 16403 found at Tue Nov 27 19:32:04 EST 2012
selfserv with PID 16403 started at Tue Nov 27 19:32:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #9074: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16403 at Tue Nov 27 19:32:04 EST 2012
kill -USR1 16403
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16403 killed at Tue Nov 27 19:32:04 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:32:04 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16461 >/dev/null 2>/dev/null
selfserv with PID 16461 found at Tue Nov 27 19:32:04 EST 2012
selfserv with PID 16461 started at Tue Nov 27 19:32:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #9075: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16461 at Tue Nov 27 19:32:05 EST 2012
kill -USR1 16461
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16461 killed at Tue Nov 27 19:32:05 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:32:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16519 >/dev/null 2>/dev/null
selfserv with PID 16519 found at Tue Nov 27 19:32:05 EST 2012
selfserv with PID 16519 started at Tue Nov 27 19:32:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w bogus -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #9076: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16519 at Tue Nov 27 19:32:05 EST 2012
kill -USR1 16519
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16519 killed at Tue Nov 27 19:32:05 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:32:05 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16589 >/dev/null 2>/dev/null
selfserv with PID 16589 found at Tue Nov 27 19:32:05 EST 2012
selfserv with PID 16589 started at Tue Nov 27 19:32:05 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #9077: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16589 at Tue Nov 27 19:32:06 EST 2012
kill -USR1 16589
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16589 killed at Tue Nov 27 19:32:06 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:32:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16647 >/dev/null 2>/dev/null
selfserv with PID 16647 found at Tue Nov 27 19:32:06 EST 2012
selfserv with PID 16647 started at Tue Nov 27 19:32:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9078: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16647 at Tue Nov 27 19:32:06 EST 2012
kill -USR1 16647
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16647 killed at Tue Nov 27 19:32:06 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:32:06 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16706 >/dev/null 2>/dev/null
selfserv with PID 16706 found at Tue Nov 27 19:32:06 EST 2012
selfserv with PID 16706 started at Tue Nov 27 19:32:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #9079: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16706 at Tue Nov 27 19:32:06 EST 2012
kill -USR1 16706
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16706 killed at Tue Nov 27 19:32:06 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:32:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16776 >/dev/null 2>/dev/null
selfserv with PID 16776 found at Tue Nov 27 19:32:07 EST 2012
selfserv with PID 16776 started at Tue Nov 27 19:32:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9080: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16776 at Tue Nov 27 19:32:07 EST 2012
kill -USR1 16776
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16776 killed at Tue Nov 27 19:32:07 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:32:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16834 >/dev/null 2>/dev/null
selfserv with PID 16834 found at Tue Nov 27 19:32:07 EST 2012
selfserv with PID 16834 started at Tue Nov 27 19:32:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9081: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16834 at Tue Nov 27 19:32:07 EST 2012
kill -USR1 16834
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16834 killed at Tue Nov 27 19:32:07 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:32:07 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16892 >/dev/null 2>/dev/null
selfserv with PID 16892 found at Tue Nov 27 19:32:07 EST 2012
selfserv with PID 16892 started at Tue Nov 27 19:32:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9082: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16892 at Tue Nov 27 19:32:08 EST 2012
kill -USR1 16892
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16892 killed at Tue Nov 27 19:32:08 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:32:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 16962 >/dev/null 2>/dev/null
selfserv with PID 16962 found at Tue Nov 27 19:32:08 EST 2012
selfserv with PID 16962 started at Tue Nov 27 19:32:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #9083: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16962 at Tue Nov 27 19:32:08 EST 2012
kill -USR1 16962
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 16962 killed at Tue Nov 27 19:32:08 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:32:08 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17020 >/dev/null 2>/dev/null
selfserv with PID 17020 found at Tue Nov 27 19:32:08 EST 2012
selfserv with PID 17020 started at Tue Nov 27 19:32:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9084: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17020 at Tue Nov 27 19:32:09 EST 2012
kill -USR1 17020
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17020 killed at Tue Nov 27 19:32:09 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:32:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17078 >/dev/null 2>/dev/null
selfserv with PID 17078 found at Tue Nov 27 19:32:09 EST 2012
selfserv with PID 17078 started at Tue Nov 27 19:32:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #9085: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17078 at Tue Nov 27 19:32:09 EST 2012
kill -USR1 17078
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17078 killed at Tue Nov 27 19:32:09 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:32:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17148 >/dev/null 2>/dev/null
selfserv with PID 17148 found at Tue Nov 27 19:32:09 EST 2012
selfserv with PID 17148 started at Tue Nov 27 19:32:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #9086: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17148 at Tue Nov 27 19:32:10 EST 2012
kill -USR1 17148
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17148 killed at Tue Nov 27 19:32:10 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:32:10 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17206 >/dev/null 2>/dev/null
selfserv with PID 17206 found at Tue Nov 27 19:32:10 EST 2012
selfserv with PID 17206 started at Tue Nov 27 19:32:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #9087: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17206 at Tue Nov 27 19:32:10 EST 2012
kill -USR1 17206
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17206 killed at Tue Nov 27 19:32:10 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Tue Nov 27 19:32:10 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17264 >/dev/null 2>/dev/null
selfserv with PID 17264 found at Tue Nov 27 19:32:10 EST 2012
selfserv with PID 17264 started at Tue Nov 27 19:32:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w bogus  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #9088: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17264 at Tue Nov 27 19:32:10 EST 2012
kill -USR1 17264
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17264 killed at Tue Nov 27 19:32:10 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:32:10 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17335 >/dev/null 2>/dev/null
selfserv with PID 17335 found at Tue Nov 27 19:32:10 EST 2012
selfserv with PID 17335 started at Tue Nov 27 19:32:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #9089: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17335 at Tue Nov 27 19:32:11 EST 2012
kill -USR1 17335
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17335 killed at Tue Nov 27 19:32:11 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:32:11 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17393 >/dev/null 2>/dev/null
selfserv with PID 17393 found at Tue Nov 27 19:32:11 EST 2012
selfserv with PID 17393 started at Tue Nov 27 19:32:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #9090: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17393 at Tue Nov 27 19:32:11 EST 2012
kill -USR1 17393
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17393 killed at Tue Nov 27 19:32:11 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:32:11 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17451 >/dev/null 2>/dev/null
selfserv with PID 17451 found at Tue Nov 27 19:32:11 EST 2012
selfserv with PID 17451 started at Tue Nov 27 19:32:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #9091: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17451 at Tue Nov 27 19:32:12 EST 2012
kill -USR1 17451
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17451 killed at Tue Nov 27 19:32:12 EST 2012
ssl.sh: Cache CRL SSL Client Tests   - with ECC ===============================
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/authin.tl.tmp
0
selfserv starting at Tue Nov 27 19:32:12 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:12 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:12 EST 2012
selfserv with PID 17516 started at Tue Nov 27 19:32:12 EST 2012
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:12 EST 2012
ssl.sh: #9092: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:12 EST 2012
ssl.sh: #9093: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:12 EST 2012
ssl.sh: #9094: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:13 EST 2012
ssl.sh: #9095: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:13 EST 2012
ssl.sh: #9096: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:13 EST 2012
ssl.sh: #9097: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:13 EST 2012
ssl.sh: #9098: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:13 EST 2012
ssl.sh: #9099: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:14 EST 2012
ssl.sh: #9100: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:14 EST 2012
ssl.sh: #9101: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:14 EST 2012
ssl.sh: #9102: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:14 EST 2012
ssl.sh: #9103: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:14 EST 2012
ssl.sh: #9104: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:15 EST 2012
================= CRL Reloaded =============
ssl.sh: #9105: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:15 EST 2012
ssl.sh: #9106: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:15 EST 2012
ssl.sh: #9107: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:15 EST 2012
ssl.sh: #9108: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:15 EST 2012
ssl.sh: #9109: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:15 EST 2012
ssl.sh: #9110: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:16 EST 2012
ssl.sh: #9111: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:16 EST 2012
ssl.sh: #9112: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:16 EST 2012
ssl.sh: #9113: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:16 EST 2012
ssl.sh: #9114: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:16 EST 2012
ssl.sh: #9115: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:17 EST 2012
ssl.sh: #9116: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:17 EST 2012
ssl.sh: #9117: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:17 EST 2012
ssl.sh: #9118: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:17 EST 2012
================= CRL Reloaded =============
ssl.sh: #9119: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:17 EST 2012
ssl.sh: #9120: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:17 EST 2012
ssl.sh: #9121: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:18 EST 2012
ssl.sh: #9122: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:18 EST 2012
ssl.sh: #9123: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:18 EST 2012
ssl.sh: #9124: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:18 EST 2012
ssl.sh: #9125: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:18 EST 2012
ssl.sh: #9126: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:19 EST 2012
ssl.sh: #9127: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:19 EST 2012
ssl.sh: #9128: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:19 EST 2012
ssl.sh: #9129: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:19 EST 2012
ssl.sh: #9130: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:19 EST 2012
ssl.sh: #9131: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 17516 >/dev/null 2>/dev/null
selfserv with PID 17516 found at Tue Nov 27 19:32:20 EST 2012
ssl.sh: #9132: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 17516 at Tue Nov 27 19:32:20 EST 2012
kill -USR1 17516
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 17516 killed at Tue Nov 27 19:32:20 EST 2012
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:32:20 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:20 EST 2012
selfserv with PID 18979 started at Tue Nov 27 19:32:20 EST 2012
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:20 EST 2012
ssl.sh: #9133: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:20 EST 2012
ssl.sh: #9134: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:20 EST 2012
ssl.sh: #9135: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:21 EST 2012
ssl.sh: #9136: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:21 EST 2012
ssl.sh: #9137: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:21 EST 2012
ssl.sh: #9138: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:21 EST 2012
ssl.sh: #9139: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:21 EST 2012
ssl.sh: #9140: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:21 EST 2012
ssl.sh: #9141: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:22 EST 2012
ssl.sh: #9142: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:22 EST 2012
ssl.sh: #9143: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:22 EST 2012
ssl.sh: #9144: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:22 EST 2012
ssl.sh: #9145: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:22 EST 2012
================= CRL Reloaded =============
ssl.sh: #9146: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:23 EST 2012
ssl.sh: #9147: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:23 EST 2012
ssl.sh: #9148: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:23 EST 2012
ssl.sh: #9149: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:23 EST 2012
ssl.sh: #9150: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:23 EST 2012
ssl.sh: #9151: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:23 EST 2012
ssl.sh: #9152: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:24 EST 2012
ssl.sh: #9153: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:24 EST 2012
ssl.sh: #9154: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:24 EST 2012
ssl.sh: #9155: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:24 EST 2012
ssl.sh: #9156: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:24 EST 2012
ssl.sh: #9157: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:25 EST 2012
ssl.sh: #9158: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:25 EST 2012
ssl.sh: #9159: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:25 EST 2012
================= CRL Reloaded =============
ssl.sh: #9160: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:25 EST 2012
ssl.sh: #9161: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:25 EST 2012
ssl.sh: #9162: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:25 EST 2012
ssl.sh: #9163: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:26 EST 2012
ssl.sh: #9164: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:26 EST 2012
ssl.sh: #9165: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:26 EST 2012
ssl.sh: #9166: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:26 EST 2012
ssl.sh: #9167: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:26 EST 2012
ssl.sh: #9168: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:27 EST 2012
ssl.sh: #9169: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:27 EST 2012
ssl.sh: #9170: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:27 EST 2012
ssl.sh: #9171: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:27 EST 2012
ssl.sh: #9172: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 18979 >/dev/null 2>/dev/null
selfserv with PID 18979 found at Tue Nov 27 19:32:27 EST 2012
ssl.sh: #9173: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 18979 at Tue Nov 27 19:32:27 EST 2012
kill -USR1 18979
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 18979 killed at Tue Nov 27 19:32:27 EST 2012
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Tue Nov 27 19:32:27 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:27 EST 2012
selfserv with PID 20442 started at Tue Nov 27 19:32:27 EST 2012
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:28 EST 2012
ssl.sh: #9174: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:28 EST 2012
ssl.sh: #9175: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:28 EST 2012
ssl.sh: #9176: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:28 EST 2012
ssl.sh: #9177: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:29 EST 2012
ssl.sh: #9178: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:29 EST 2012
ssl.sh: #9179: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:29 EST 2012
ssl.sh: #9180: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:29 EST 2012
ssl.sh: #9181: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:29 EST 2012
ssl.sh: #9182: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:30 EST 2012
ssl.sh: #9183: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:30 EST 2012
ssl.sh: #9184: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:30 EST 2012
ssl.sh: #9185: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:30 EST 2012
ssl.sh: #9186: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:30 EST 2012
================= CRL Reloaded =============
ssl.sh: #9187: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:31 EST 2012
ssl.sh: #9188: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:31 EST 2012
ssl.sh: #9189: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:31 EST 2012
ssl.sh: #9190: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:31 EST 2012
ssl.sh: #9191: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:31 EST 2012
ssl.sh: #9192: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:32 EST 2012
ssl.sh: #9193: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:32 EST 2012
ssl.sh: #9194: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:32 EST 2012
ssl.sh: #9195: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:32 EST 2012
ssl.sh: #9196: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:33 EST 2012
ssl.sh: #9197: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:33 EST 2012
ssl.sh: #9198: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:33 EST 2012
ssl.sh: #9199: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:33 EST 2012
ssl.sh: #9200: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:33 EST 2012
================= CRL Reloaded =============
ssl.sh: #9201: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:34 EST 2012
ssl.sh: #9202: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:34 EST 2012
ssl.sh: #9203: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:34 EST 2012
ssl.sh: #9204: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:34 EST 2012
ssl.sh: #9205: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:34 EST 2012
ssl.sh: #9206: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:35 EST 2012
ssl.sh: #9207: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:35 EST 2012
ssl.sh: #9208: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:35 EST 2012
ssl.sh: #9209: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:35 EST 2012
ssl.sh: #9210: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:35 EST 2012
ssl.sh: #9211: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:36 EST 2012
ssl.sh: #9212: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:36 EST 2012
ssl.sh: #9213: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 20442 >/dev/null 2>/dev/null
selfserv with PID 20442 found at Tue Nov 27 19:32:36 EST 2012
ssl.sh: #9214: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 20442 at Tue Nov 27 19:32:36 EST 2012
kill -USR1 20442
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 20442 killed at Tue Nov 27 19:32:36 EST 2012
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:32:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:36 EST 2012
selfserv with PID 21905 started at Tue Nov 27 19:32:36 EST 2012
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:36 EST 2012
ssl.sh: #9215: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:37 EST 2012
ssl.sh: #9216: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:37 EST 2012
ssl.sh: #9217: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:37 EST 2012
ssl.sh: #9218: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:37 EST 2012
ssl.sh: #9219: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:38 EST 2012
ssl.sh: #9220: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:38 EST 2012
ssl.sh: #9221: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:38 EST 2012
ssl.sh: #9222: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:38 EST 2012
ssl.sh: #9223: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:38 EST 2012
ssl.sh: #9224: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:39 EST 2012
ssl.sh: #9225: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:39 EST 2012
ssl.sh: #9226: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:39 EST 2012
ssl.sh: #9227: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:39 EST 2012
================= CRL Reloaded =============
ssl.sh: #9228: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:40 EST 2012
ssl.sh: #9229: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:40 EST 2012
ssl.sh: #9230: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:40 EST 2012
ssl.sh: #9231: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:40 EST 2012
ssl.sh: #9232: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:40 EST 2012
ssl.sh: #9233: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:41 EST 2012
ssl.sh: #9234: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:41 EST 2012
ssl.sh: #9235: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:41 EST 2012
ssl.sh: #9236: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:41 EST 2012
ssl.sh: #9237: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:41 EST 2012
ssl.sh: #9238: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:42 EST 2012
ssl.sh: #9239: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:42 EST 2012
ssl.sh: #9240: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:42 EST 2012
ssl.sh: #9241: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:42 EST 2012
================= CRL Reloaded =============
ssl.sh: #9242: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:43 EST 2012
ssl.sh: #9243: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:43 EST 2012
ssl.sh: #9244: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:43 EST 2012
ssl.sh: #9245: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:43 EST 2012
ssl.sh: #9246: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:43 EST 2012
ssl.sh: #9247: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:44 EST 2012
ssl.sh: #9248: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:44 EST 2012
ssl.sh: #9249: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:44 EST 2012
ssl.sh: #9250: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:44 EST 2012
ssl.sh: #9251: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:44 EST 2012
ssl.sh: #9252: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:45 EST 2012
ssl.sh: #9253: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:45 EST 2012
ssl.sh: #9254: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V :ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 21905 >/dev/null 2>/dev/null
selfserv with PID 21905 found at Tue Nov 27 19:32:45 EST 2012
ssl.sh: #9255: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 21905 at Tue Nov 27 19:32:45 EST 2012
kill -USR1 21905
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 21905 killed at Tue Nov 27 19:32:45 EST 2012
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:32:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23367 >/dev/null 2>/dev/null
selfserv with PID 23367 found at Tue Nov 27 19:32:45 EST 2012
selfserv with PID 23367 started at Tue Nov 27 19:32:45 EST 2012
trying to kill selfserv with PID 23367 at Tue Nov 27 19:32:45 EST 2012
kill -USR1 23367
./ssl.sh: line 173: 23367 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23367 killed at Tue Nov 27 19:32:45 EST 2012
selfserv starting at Tue Nov 27 19:32:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:45 EST 2012
selfserv with PID 23401 started at Tue Nov 27 19:32:45 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:45 EST 2012
ssl.sh: #9256: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:46 EST 2012
ssl.sh: #9257: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:46 EST 2012
ssl.sh: #9258: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:46 EST 2012
ssl.sh: #9259: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:46 EST 2012
ssl.sh: #9260: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:46 EST 2012
ssl.sh: #9261: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:47 EST 2012
ssl.sh: #9262: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:47 EST 2012
ssl.sh: #9263: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:47 EST 2012
ssl.sh: #9264: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:47 EST 2012
ssl.sh: #9265: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:47 EST 2012
ssl.sh: #9266: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:48 EST 2012
ssl.sh: #9267: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:48 EST 2012
ssl.sh: #9268: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:48 EST 2012
================= CRL Reloaded =============
ssl.sh: #9269: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:48 EST 2012
ssl.sh: #9270: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:48 EST 2012
ssl.sh: #9271: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:49 EST 2012
ssl.sh: #9272: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:49 EST 2012
ssl.sh: #9273: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:49 EST 2012
ssl.sh: #9274: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:49 EST 2012
ssl.sh: #9275: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:49 EST 2012
ssl.sh: #9276: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:50 EST 2012
ssl.sh: #9277: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:50 EST 2012
ssl.sh: #9278: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:50 EST 2012
ssl.sh: #9279: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:50 EST 2012
ssl.sh: #9280: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:50 EST 2012
ssl.sh: #9281: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:51 EST 2012
ssl.sh: #9282: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:51 EST 2012
================= CRL Reloaded =============
ssl.sh: #9283: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:51 EST 2012
ssl.sh: #9284: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:51 EST 2012
ssl.sh: #9285: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:51 EST 2012
ssl.sh: #9286: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:52 EST 2012
ssl.sh: #9287: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:52 EST 2012
ssl.sh: #9288: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:52 EST 2012
ssl.sh: #9289: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:52 EST 2012
ssl.sh: #9290: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:52 EST 2012
ssl.sh: #9291: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:53 EST 2012
ssl.sh: #9292: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:53 EST 2012
ssl.sh: #9293: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:53 EST 2012
ssl.sh: #9294: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:53 EST 2012
ssl.sh: #9295: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 23401 >/dev/null 2>/dev/null
selfserv with PID 23401 found at Tue Nov 27 19:32:53 EST 2012
ssl.sh: #9296: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23401 at Tue Nov 27 19:32:53 EST 2012
kill -USR1 23401
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 23401 killed at Tue Nov 27 19:32:53 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:32:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:32:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:53 EST 2012
selfserv with PID 24863 started at Tue Nov 27 19:32:53 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:54 EST 2012
ssl.sh: #9297: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:54 EST 2012
ssl.sh: #9298: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:54 EST 2012
ssl.sh: #9299: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:54 EST 2012
ssl.sh: #9300: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:54 EST 2012
ssl.sh: #9301: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:55 EST 2012
ssl.sh: #9302: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:55 EST 2012
ssl.sh: #9303: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:55 EST 2012
ssl.sh: #9304: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:55 EST 2012
ssl.sh: #9305: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:55 EST 2012
ssl.sh: #9306: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:56 EST 2012
ssl.sh: #9307: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:56 EST 2012
ssl.sh: #9308: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:56 EST 2012
ssl.sh: #9309: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:56 EST 2012
================= CRL Reloaded =============
ssl.sh: #9310: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:56 EST 2012
ssl.sh: #9311: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:56 EST 2012
ssl.sh: #9312: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:57 EST 2012
ssl.sh: #9313: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:57 EST 2012
ssl.sh: #9314: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:57 EST 2012
ssl.sh: #9315: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:57 EST 2012
ssl.sh: #9316: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:57 EST 2012
ssl.sh: #9317: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:58 EST 2012
ssl.sh: #9318: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:58 EST 2012
ssl.sh: #9319: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:58 EST 2012
ssl.sh: #9320: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:58 EST 2012
ssl.sh: #9321: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:58 EST 2012
ssl.sh: #9322: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:59 EST 2012
ssl.sh: #9323: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:59 EST 2012
================= CRL Reloaded =============
ssl.sh: #9324: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:59 EST 2012
ssl.sh: #9325: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:59 EST 2012
ssl.sh: #9326: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:59 EST 2012
ssl.sh: #9327: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:32:59 EST 2012
ssl.sh: #9328: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:33:00 EST 2012
ssl.sh: #9329: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:33:00 EST 2012
ssl.sh: #9330: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:33:00 EST 2012
ssl.sh: #9331: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:33:00 EST 2012
ssl.sh: #9332: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:33:00 EST 2012
ssl.sh: #9333: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:33:01 EST 2012
ssl.sh: #9334: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:33:01 EST 2012
ssl.sh: #9335: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:33:01 EST 2012
ssl.sh: #9336: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 24863 >/dev/null 2>/dev/null
selfserv with PID 24863 found at Tue Nov 27 19:33:01 EST 2012
ssl.sh: #9337: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24863 at Tue Nov 27 19:33:01 EST 2012
kill -USR1 24863
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 24863 killed at Tue Nov 27 19:33:01 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:33:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:33:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:01 EST 2012
selfserv with PID 26325 started at Tue Nov 27 19:33:01 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:02 EST 2012
ssl.sh: #9338: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:02 EST 2012
ssl.sh: #9339: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:02 EST 2012
ssl.sh: #9340: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:02 EST 2012
ssl.sh: #9341: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:02 EST 2012
ssl.sh: #9342: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:03 EST 2012
ssl.sh: #9343: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:03 EST 2012
ssl.sh: #9344: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:03 EST 2012
ssl.sh: #9345: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:03 EST 2012
ssl.sh: #9346: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:03 EST 2012
ssl.sh: #9347: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:03 EST 2012
ssl.sh: #9348: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:04 EST 2012
ssl.sh: #9349: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:04 EST 2012
ssl.sh: #9350: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:04 EST 2012
================= CRL Reloaded =============
ssl.sh: #9351: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:04 EST 2012
ssl.sh: #9352: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:04 EST 2012
ssl.sh: #9353: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:05 EST 2012
ssl.sh: #9354: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:05 EST 2012
ssl.sh: #9355: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:05 EST 2012
ssl.sh: #9356: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:05 EST 2012
ssl.sh: #9357: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:05 EST 2012
ssl.sh: #9358: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:05 EST 2012
ssl.sh: #9359: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:06 EST 2012
ssl.sh: #9360: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:06 EST 2012
ssl.sh: #9361: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:06 EST 2012
ssl.sh: #9362: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:06 EST 2012
ssl.sh: #9363: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:06 EST 2012
ssl.sh: #9364: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:07 EST 2012
================= CRL Reloaded =============
ssl.sh: #9365: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:07 EST 2012
ssl.sh: #9366: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:07 EST 2012
ssl.sh: #9367: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:07 EST 2012
ssl.sh: #9368: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:07 EST 2012
ssl.sh: #9369: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:08 EST 2012
ssl.sh: #9370: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:08 EST 2012
ssl.sh: #9371: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:08 EST 2012
ssl.sh: #9372: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:08 EST 2012
ssl.sh: #9373: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:08 EST 2012
ssl.sh: #9374: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:09 EST 2012
ssl.sh: #9375: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:09 EST 2012
ssl.sh: #9376: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:09 EST 2012
ssl.sh: #9377: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 26325 >/dev/null 2>/dev/null
selfserv with PID 26325 found at Tue Nov 27 19:33:09 EST 2012
ssl.sh: #9378: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 26325 at Tue Nov 27 19:33:09 EST 2012
kill -USR1 26325
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 26325 killed at Tue Nov 27 19:33:09 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:33:09 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:33:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:09 EST 2012
selfserv with PID 27788 started at Tue Nov 27 19:33:09 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:10 EST 2012
ssl.sh: #9379: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:10 EST 2012
ssl.sh: #9380: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:10 EST 2012
ssl.sh: #9381: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:10 EST 2012
ssl.sh: #9382: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:10 EST 2012
ssl.sh: #9383: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:11 EST 2012
ssl.sh: #9384: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:11 EST 2012
ssl.sh: #9385: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:11 EST 2012
ssl.sh: #9386: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:11 EST 2012
ssl.sh: #9387: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:12 EST 2012
ssl.sh: #9388: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:12 EST 2012
ssl.sh: #9389: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:12 EST 2012
ssl.sh: #9390: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:12 EST 2012
ssl.sh: #9391: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:12 EST 2012
================= CRL Reloaded =============
ssl.sh: #9392: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:13 EST 2012
ssl.sh: #9393: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:13 EST 2012
ssl.sh: #9394: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:13 EST 2012
ssl.sh: #9395: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:13 EST 2012
ssl.sh: #9396: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:13 EST 2012
ssl.sh: #9397: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:14 EST 2012
ssl.sh: #9398: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:14 EST 2012
ssl.sh: #9399: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:14 EST 2012
ssl.sh: #9400: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:14 EST 2012
ssl.sh: #9401: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:14 EST 2012
ssl.sh: #9402: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:15 EST 2012
ssl.sh: #9403: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:15 EST 2012
ssl.sh: #9404: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:15 EST 2012
ssl.sh: #9405: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:15 EST 2012
================= CRL Reloaded =============
ssl.sh: #9406: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:16 EST 2012
ssl.sh: #9407: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:16 EST 2012
ssl.sh: #9408: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:16 EST 2012
ssl.sh: #9409: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:16 EST 2012
ssl.sh: #9410: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:16 EST 2012
ssl.sh: #9411: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:17 EST 2012
ssl.sh: #9412: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:17 EST 2012
ssl.sh: #9413: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:17 EST 2012
ssl.sh: #9414: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:17 EST 2012
ssl.sh: #9415: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:18 EST 2012
ssl.sh: #9416: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:18 EST 2012
ssl.sh: #9417: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:18 EST 2012
ssl.sh: #9418: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 27788 >/dev/null 2>/dev/null
selfserv with PID 27788 found at Tue Nov 27 19:33:18 EST 2012
ssl.sh: #9419: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 27788 at Tue Nov 27 19:33:18 EST 2012
kill -USR1 27788
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 27788 killed at Tue Nov 27 19:33:18 EST 2012
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:33:18 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:33:18 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:18 EST 2012
selfserv with PID 29251 started at Tue Nov 27 19:33:18 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:19 EST 2012
ssl.sh: #9420: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:19 EST 2012
ssl.sh: #9421: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:19 EST 2012
ssl.sh: #9422: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:19 EST 2012
ssl.sh: #9423: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:20 EST 2012
ssl.sh: #9424: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:20 EST 2012
ssl.sh: #9425: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:20 EST 2012
ssl.sh: #9426: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:20 EST 2012
ssl.sh: #9427: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:20 EST 2012
ssl.sh: #9428: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:21 EST 2012
ssl.sh: #9429: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:21 EST 2012
ssl.sh: #9430: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:21 EST 2012
ssl.sh: #9431: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:21 EST 2012
ssl.sh: #9432: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:22 EST 2012
================= CRL Reloaded =============
ssl.sh: #9433: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:22 EST 2012
ssl.sh: #9434: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:22 EST 2012
ssl.sh: #9435: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:22 EST 2012
ssl.sh: #9436: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:22 EST 2012
ssl.sh: #9437: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:23 EST 2012
ssl.sh: #9438: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:23 EST 2012
ssl.sh: #9439: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:23 EST 2012
ssl.sh: #9440: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:23 EST 2012
ssl.sh: #9441: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:23 EST 2012
ssl.sh: #9442: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:24 EST 2012
ssl.sh: #9443: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:24 EST 2012
ssl.sh: #9444: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:24 EST 2012
ssl.sh: #9445: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:24 EST 2012
ssl.sh: #9446: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:25 EST 2012
================= CRL Reloaded =============
ssl.sh: #9447: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:25 EST 2012
ssl.sh: #9448: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:25 EST 2012
ssl.sh: #9449: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:25 EST 2012
ssl.sh: #9450: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:25 EST 2012
ssl.sh: #9451: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:26 EST 2012
ssl.sh: #9452: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:26 EST 2012
ssl.sh: #9453: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:26 EST 2012
ssl.sh: #9454: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:26 EST 2012
ssl.sh: #9455: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:26 EST 2012
ssl.sh: #9456: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:27 EST 2012
ssl.sh: #9457: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:27 EST 2012
ssl.sh: #9458: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:27 EST 2012
ssl.sh: #9459: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29251 >/dev/null 2>/dev/null
selfserv with PID 29251 found at Tue Nov 27 19:33:27 EST 2012
ssl.sh: #9460: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29251 at Tue Nov 27 19:33:27 EST 2012
kill -USR1 29251
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 29251 killed at Tue Nov 27 19:33:27 EST 2012
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:33:27 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:33:27 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:27 EST 2012
selfserv with PID 30713 started at Tue Nov 27 19:33:27 EST 2012
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:28 EST 2012
ssl.sh: #9461: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:28 EST 2012
ssl.sh: #9462: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:28 EST 2012
ssl.sh: #9463: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:28 EST 2012
ssl.sh: #9464: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:29 EST 2012
ssl.sh: #9465: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:29 EST 2012
ssl.sh: #9466: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:29 EST 2012
ssl.sh: #9467: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:29 EST 2012
ssl.sh: #9468: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:30 EST 2012
ssl.sh: #9469: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:30 EST 2012
ssl.sh: #9470: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:30 EST 2012
ssl.sh: #9471: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:30 EST 2012
ssl.sh: #9472: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:30 EST 2012
ssl.sh: #9473: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:31 EST 2012
================= CRL Reloaded =============
ssl.sh: #9474: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:31 EST 2012
ssl.sh: #9475: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:31 EST 2012
ssl.sh: #9476: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:31 EST 2012
ssl.sh: #9477: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:32 EST 2012
ssl.sh: #9478: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:32 EST 2012
ssl.sh: #9479: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:32 EST 2012
ssl.sh: #9480: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:32 EST 2012
ssl.sh: #9481: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:32 EST 2012
ssl.sh: #9482: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:33 EST 2012
ssl.sh: #9483: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:33 EST 2012
ssl.sh: #9484: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:33 EST 2012
ssl.sh: #9485: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:33 EST 2012
ssl.sh: #9486: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:34 EST 2012
ssl.sh: #9487: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:34 EST 2012
================= CRL Reloaded =============
ssl.sh: #9488: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:34 EST 2012
ssl.sh: #9489: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:34 EST 2012
ssl.sh: #9490: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:34 EST 2012
ssl.sh: #9491: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:35 EST 2012
ssl.sh: #9492: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:35 EST 2012
ssl.sh: #9493: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:35 EST 2012
ssl.sh: #9494: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:35 EST 2012
ssl.sh: #9495: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:35 EST 2012
ssl.sh: #9496: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:36 EST 2012
ssl.sh: #9497: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:36 EST 2012
ssl.sh: #9498: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:36 EST 2012
ssl.sh: #9499: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:36 EST 2012
ssl.sh: #9500: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30713 >/dev/null 2>/dev/null
selfserv with PID 30713 found at Tue Nov 27 19:33:37 EST 2012
ssl.sh: #9501: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30713 at Tue Nov 27 19:33:37 EST 2012
kill -USR1 30713
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 30713 killed at Tue Nov 27 19:33:37 EST 2012
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:33:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:33:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32175 >/dev/null 2>/dev/null
selfserv with PID 32175 found at Tue Nov 27 19:33:37 EST 2012
selfserv with PID 32175 started at Tue Nov 27 19:33:37 EST 2012
trying to kill selfserv with PID 32175 at Tue Nov 27 19:33:37 EST 2012
kill -USR1 32175
./ssl.sh: line 173: 32175 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32175 killed at Tue Nov 27 19:33:37 EST 2012
selfserv starting at Tue Nov 27 19:33:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:33:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:37 EST 2012
selfserv with PID 32209 started at Tue Nov 27 19:33:37 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:37 EST 2012
ssl.sh: #9502: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:37 EST 2012
ssl.sh: #9503: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:38 EST 2012
ssl.sh: #9504: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:38 EST 2012
ssl.sh: #9505: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:38 EST 2012
ssl.sh: #9506: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:38 EST 2012
ssl.sh: #9507: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:38 EST 2012
ssl.sh: #9508: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:38 EST 2012
ssl.sh: #9509: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:39 EST 2012
ssl.sh: #9510: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:39 EST 2012
ssl.sh: #9511: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:39 EST 2012
ssl.sh: #9512: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:39 EST 2012
ssl.sh: #9513: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:39 EST 2012
ssl.sh: #9514: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:40 EST 2012
================= CRL Reloaded =============
ssl.sh: #9515: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:40 EST 2012
ssl.sh: #9516: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:40 EST 2012
ssl.sh: #9517: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:40 EST 2012
ssl.sh: #9518: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:40 EST 2012
ssl.sh: #9519: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:41 EST 2012
ssl.sh: #9520: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:41 EST 2012
ssl.sh: #9521: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:41 EST 2012
ssl.sh: #9522: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:41 EST 2012
ssl.sh: #9523: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:41 EST 2012
ssl.sh: #9524: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:41 EST 2012
ssl.sh: #9525: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:42 EST 2012
ssl.sh: #9526: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:42 EST 2012
ssl.sh: #9527: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:42 EST 2012
ssl.sh: #9528: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:42 EST 2012
================= CRL Reloaded =============
ssl.sh: #9529: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:42 EST 2012
ssl.sh: #9530: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:43 EST 2012
ssl.sh: #9531: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:43 EST 2012
ssl.sh: #9532: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:43 EST 2012
ssl.sh: #9533: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:43 EST 2012
ssl.sh: #9534: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:43 EST 2012
ssl.sh: #9535: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:44 EST 2012
ssl.sh: #9536: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:44 EST 2012
ssl.sh: #9537: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:44 EST 2012
ssl.sh: #9538: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:44 EST 2012
ssl.sh: #9539: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:44 EST 2012
ssl.sh: #9540: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:45 EST 2012
ssl.sh: #9541: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32209 >/dev/null 2>/dev/null
selfserv with PID 32209 found at Tue Nov 27 19:33:45 EST 2012
ssl.sh: #9542: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32209 at Tue Nov 27 19:33:45 EST 2012
kill -USR1 32209
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 32209 killed at Tue Nov 27 19:33:45 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:33:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:33:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:45 EST 2012
selfserv with PID 1319 started at Tue Nov 27 19:33:45 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:45 EST 2012
ssl.sh: #9543: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:45 EST 2012
ssl.sh: #9544: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:46 EST 2012
ssl.sh: #9545: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:46 EST 2012
ssl.sh: #9546: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:46 EST 2012
ssl.sh: #9547: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:46 EST 2012
ssl.sh: #9548: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:46 EST 2012
ssl.sh: #9549: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:47 EST 2012
ssl.sh: #9550: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:47 EST 2012
ssl.sh: #9551: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:47 EST 2012
ssl.sh: #9552: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:47 EST 2012
ssl.sh: #9553: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:47 EST 2012
ssl.sh: #9554: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:48 EST 2012
ssl.sh: #9555: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:48 EST 2012
================= CRL Reloaded =============
ssl.sh: #9556: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:48 EST 2012
ssl.sh: #9557: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:48 EST 2012
ssl.sh: #9558: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:48 EST 2012
ssl.sh: #9559: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:48 EST 2012
ssl.sh: #9560: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:49 EST 2012
ssl.sh: #9561: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:49 EST 2012
ssl.sh: #9562: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:49 EST 2012
ssl.sh: #9563: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:49 EST 2012
ssl.sh: #9564: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:49 EST 2012
ssl.sh: #9565: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:50 EST 2012
ssl.sh: #9566: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:50 EST 2012
ssl.sh: #9567: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:50 EST 2012
ssl.sh: #9568: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:50 EST 2012
ssl.sh: #9569: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:50 EST 2012
================= CRL Reloaded =============
ssl.sh: #9570: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:51 EST 2012
ssl.sh: #9571: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:51 EST 2012
ssl.sh: #9572: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:51 EST 2012
ssl.sh: #9573: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:51 EST 2012
ssl.sh: #9574: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:51 EST 2012
ssl.sh: #9575: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:52 EST 2012
ssl.sh: #9576: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:52 EST 2012
ssl.sh: #9577: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:52 EST 2012
ssl.sh: #9578: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:52 EST 2012
ssl.sh: #9579: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:52 EST 2012
ssl.sh: #9580: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:53 EST 2012
ssl.sh: #9581: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:53 EST 2012
ssl.sh: #9582: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1319 >/dev/null 2>/dev/null
selfserv with PID 1319 found at Tue Nov 27 19:33:53 EST 2012
ssl.sh: #9583: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1319 at Tue Nov 27 19:33:53 EST 2012
kill -USR1 1319
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 1319 killed at Tue Nov 27 19:33:53 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:33:53 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:33:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:53 EST 2012
selfserv with PID 2782 started at Tue Nov 27 19:33:53 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:53 EST 2012
ssl.sh: #9584: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:54 EST 2012
ssl.sh: #9585: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:54 EST 2012
ssl.sh: #9586: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:54 EST 2012
ssl.sh: #9587: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:54 EST 2012
ssl.sh: #9588: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:54 EST 2012
ssl.sh: #9589: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:55 EST 2012
ssl.sh: #9590: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:55 EST 2012
ssl.sh: #9591: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:55 EST 2012
ssl.sh: #9592: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:55 EST 2012
ssl.sh: #9593: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:55 EST 2012
ssl.sh: #9594: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:55 EST 2012
ssl.sh: #9595: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:56 EST 2012
ssl.sh: #9596: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:56 EST 2012
================= CRL Reloaded =============
ssl.sh: #9597: Load group 2 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:56 EST 2012
ssl.sh: #9598: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:56 EST 2012
ssl.sh: #9599: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:56 EST 2012
ssl.sh: #9600: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:57 EST 2012
ssl.sh: #9601: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:57 EST 2012
ssl.sh: #9602: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:57 EST 2012
ssl.sh: #9603: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:57 EST 2012
ssl.sh: #9604: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:57 EST 2012
ssl.sh: #9605: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:58 EST 2012
ssl.sh: #9606: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:58 EST 2012
ssl.sh: #9607: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:58 EST 2012
ssl.sh: #9608: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:58 EST 2012
ssl.sh: #9609: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:58 EST 2012
ssl.sh: #9610: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 159 bytes
tstclnt: Writing 159 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:59 EST 2012
================= CRL Reloaded =============
ssl.sh: #9611: Load group 3 crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:59 EST 2012
ssl.sh: #9612: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:59 EST 2012
ssl.sh: #9613: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:59 EST 2012
ssl.sh: #9614: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:33:59 EST 2012
ssl.sh: #9615: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:34:00 EST 2012
ssl.sh: #9616: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:34:00 EST 2012
ssl.sh: #9617: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:34:00 EST 2012
ssl.sh: #9618: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:34:00 EST 2012
ssl.sh: #9619: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:34:00 EST 2012
ssl.sh: #9620: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:34:01 EST 2012
ssl.sh: #9621: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:34:01 EST 2012
ssl.sh: #9622: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:34:01 EST 2012
ssl.sh: #9623: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52 -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2782 >/dev/null 2>/dev/null
selfserv with PID 2782 found at Tue Nov 27 19:34:01 EST 2012
ssl.sh: #9624: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2782 at Tue Nov 27 19:34:01 EST 2012
kill -USR1 2782
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 2782 killed at Tue Nov 27 19:34:01 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Tue Nov 27 19:34:01 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:01 EST 2012
selfserv with PID 4244 started at Tue Nov 27 19:34:01 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:02 EST 2012
ssl.sh: #9625: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:02 EST 2012
ssl.sh: #9626: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:02 EST 2012
ssl.sh: #9627: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:02 EST 2012
ssl.sh: #9628: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:02 EST 2012
ssl.sh: #9629: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:03 EST 2012
ssl.sh: #9630: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:03 EST 2012
ssl.sh: #9631: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:03 EST 2012
ssl.sh: #9632: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:03 EST 2012
ssl.sh: #9633: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:04 EST 2012
ssl.sh: #9634: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:04 EST 2012
ssl.sh: #9635: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:04 EST 2012
ssl.sh: #9636: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:04 EST 2012
ssl.sh: #9637: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:04 EST 2012
================= CRL Reloaded =============
ssl.sh: #9638: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:05 EST 2012
ssl.sh: #9639: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:05 EST 2012
ssl.sh: #9640: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:05 EST 2012
ssl.sh: #9641: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:05 EST 2012
ssl.sh: #9642: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:05 EST 2012
ssl.sh: #9643: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:06 EST 2012
ssl.sh: #9644: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:06 EST 2012
ssl.sh: #9645: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:06 EST 2012
ssl.sh: #9646: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:06 EST 2012
ssl.sh: #9647: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:07 EST 2012
ssl.sh: #9648: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:07 EST 2012
ssl.sh: #9649: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:07 EST 2012
ssl.sh: #9650: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:07 EST 2012
ssl.sh: #9651: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:08 EST 2012
================= CRL Reloaded =============
ssl.sh: #9652: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:08 EST 2012
ssl.sh: #9653: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:08 EST 2012
ssl.sh: #9654: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:08 EST 2012
ssl.sh: #9655: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:08 EST 2012
ssl.sh: #9656: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:09 EST 2012
ssl.sh: #9657: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:09 EST 2012
ssl.sh: #9658: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:09 EST 2012
ssl.sh: #9659: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:09 EST 2012
ssl.sh: #9660: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:09 EST 2012
ssl.sh: #9661: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:10 EST 2012
ssl.sh: #9662: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:10 EST 2012
ssl.sh: #9663: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:10 EST 2012
ssl.sh: #9664: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3: -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4244 >/dev/null 2>/dev/null
selfserv with PID 4244 found at Tue Nov 27 19:34:10 EST 2012
ssl.sh: #9665: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4244 at Tue Nov 27 19:34:10 EST 2012
kill -USR1 4244
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 4244 killed at Tue Nov 27 19:34:10 EST 2012
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:34:10 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:10 EST 2012
selfserv with PID 5718 started at Tue Nov 27 19:34:10 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:11 EST 2012
ssl.sh: #9666: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:11 EST 2012
ssl.sh: #9667: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:11 EST 2012
ssl.sh: #9668: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:11 EST 2012
ssl.sh: #9669: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:12 EST 2012
ssl.sh: #9670: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:12 EST 2012
ssl.sh: #9671: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:12 EST 2012
ssl.sh: #9672: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:12 EST 2012
ssl.sh: #9673: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:13 EST 2012
ssl.sh: #9674: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:13 EST 2012
ssl.sh: #9675: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:13 EST 2012
ssl.sh: #9676: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:13 EST 2012
ssl.sh: #9677: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:14 EST 2012
ssl.sh: #9678: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:14 EST 2012
================= CRL Reloaded =============
ssl.sh: #9679: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:14 EST 2012
ssl.sh: #9680: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:14 EST 2012
ssl.sh: #9681: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:14 EST 2012
ssl.sh: #9682: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:15 EST 2012
ssl.sh: #9683: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:15 EST 2012
ssl.sh: #9684: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:15 EST 2012
ssl.sh: #9685: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:15 EST 2012
ssl.sh: #9686: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:15 EST 2012
ssl.sh: #9687: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:16 EST 2012
ssl.sh: #9688: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:16 EST 2012
ssl.sh: #9689: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:16 EST 2012
ssl.sh: #9690: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:16 EST 2012
ssl.sh: #9691: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:17 EST 2012
ssl.sh: #9692: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:17 EST 2012
================= CRL Reloaded =============
ssl.sh: #9693: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser40-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:17 EST 2012
ssl.sh: #9694: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser41-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:17 EST 2012
ssl.sh: #9695: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser42-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:17 EST 2012
ssl.sh: #9696: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser43-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:18 EST 2012
ssl.sh: #9697: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser44-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:18 EST 2012
ssl.sh: #9698: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser45-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:18 EST 2012
ssl.sh: #9699: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser46-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:18 EST 2012
ssl.sh: #9700: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser47-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:19 EST 2012
ssl.sh: #9701: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser48-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:19 EST 2012
ssl.sh: #9702: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser49-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:19 EST 2012
ssl.sh: #9703: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser50-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:19 EST 2012
ssl.sh: #9704: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser51-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:19 EST 2012
ssl.sh: #9705: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:tls1.0 -w nss -n TestUser52-ec   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5718 >/dev/null 2>/dev/null
selfserv with PID 5718 found at Tue Nov 27 19:34:20 EST 2012
ssl.sh: #9706: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5718 at Tue Nov 27 19:34:20 EST 2012
kill -USR1 5718
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 5718 killed at Tue Nov 27 19:34:20 EST 2012
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:34:20 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:20 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:20 EST 2012
selfserv with PID 7181 started at Tue Nov 27 19:34:20 EST 2012
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:20 EST 2012
ssl.sh: #9707: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:20 EST 2012
ssl.sh: #9708: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:20 EST 2012
ssl.sh: #9709: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:21 EST 2012
ssl.sh: #9710: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:21 EST 2012
ssl.sh: #9711: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:21 EST 2012
ssl.sh: #9712: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:21 EST 2012
ssl.sh: #9713: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:22 EST 2012
ssl.sh: #9714: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:22 EST 2012
ssl.sh: #9715: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:22 EST 2012
ssl.sh: #9716: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:22 EST 2012
ssl.sh: #9717: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:22 EST 2012
ssl.sh: #9718: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:23 EST 2012
ssl.sh: #9719: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_43-48-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:23 EST 2012
================= CRL Reloaded =============
ssl.sh: #9720: Load group 2 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:23 EST 2012
ssl.sh: #9721: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:23 EST 2012
ssl.sh: #9722: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:23 EST 2012
ssl.sh: #9723: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:24 EST 2012
ssl.sh: #9724: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:24 EST 2012
ssl.sh: #9725: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:24 EST 2012
ssl.sh: #9726: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:24 EST 2012
ssl.sh: #9727: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:25 EST 2012
ssl.sh: #9728: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:25 EST 2012
ssl.sh: #9729: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:25 EST 2012
ssl.sh: #9730: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:25 EST 2012
ssl.sh: #9731: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:25 EST 2012
ssl.sh: #9732: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:26 EST 2012
ssl.sh: #9733: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
          -V ssl3: -w nss -n TestUser41-ec
Request:
GET crl:///home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/server/root.crl_49-52-ec

RELOAD time tests.*
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 162 bytes
tstclnt: Writing 162 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:26 EST 2012
================= CRL Reloaded =============
ssl.sh: #9734: Load group 3 ECC crl  produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser40-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:26 EST 2012
ssl.sh: #9735: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser41-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:26 EST 2012
ssl.sh: #9736: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser42-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:26 EST 2012
ssl.sh: #9737: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser43-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:27 EST 2012
ssl.sh: #9738: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser44-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:27 EST 2012
ssl.sh: #9739: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser45-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:27 EST 2012
ssl.sh: #9740: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser46-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:27 EST 2012
ssl.sh: #9741: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser47-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:27 EST 2012
ssl.sh: #9742: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser48-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:28 EST 2012
ssl.sh: #9743: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser49-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:28 EST 2012
ssl.sh: #9744: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser50-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:28 EST 2012
ssl.sh: #9745: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser51-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: Read from server 1 bytes
H

tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain

GET / HTTP/1.0

EOF




tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:28 EST 2012
ssl.sh: #9746: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -f -d ../client -v \
        -V ssl3:ssl3 -n TestUser52-ec -w nss  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
tstclnt: connect: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 1024-bit RSA, Key Exchange: 1024-bit RSA
         Compression: NULL
subject DN: CN=buildnss02.usersys.redhat.com,E=buildnss02.usersys.redhat.com@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer  DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7181 >/dev/null 2>/dev/null
selfserv with PID 7181 found at Tue Nov 27 19:34:29 EST 2012
ssl.sh: #9747: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 7181 at Tue Nov 27 19:34:29 EST 2012
kill -USR1 7181
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 7181 killed at Tue Nov 27 19:34:29 EST 2012
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Tue Nov 27 19:34:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com  \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com  -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8644 >/dev/null 2>/dev/null
selfserv with PID 8644 found at Tue Nov 27 19:34:29 EST 2012
selfserv with PID 8644 started at Tue Nov 27 19:34:29 EST 2012
trying to kill selfserv with PID 8644 at Tue Nov 27 19:34:29 EST 2012
kill -USR1 8644
./ssl.sh: line 173:  8644 User defined signal 1   ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -w nss ${sparam} -i ${R_SERVERPID} $verbose
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8644 killed at Tue Nov 27 19:34:29 EST 2012
ssl.sh: SSL Stress Test  - server bypass/client bypass  - with ECC ===============================
ssl.sh: Stress SSL2 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:34:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8767 >/dev/null 2>/dev/null
selfserv with PID 8767 found at Tue Nov 27 19:34:29 EST 2012
selfserv with PID 8767 started at Tue Nov 27 19:34:29 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C A \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:29 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: SSL2 - 1 server certificates tested.
strsclnt completed at Tue Nov 27 19:34:29 EST 2012
ssl.sh: #9748: Stress SSL2 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8767 at Tue Nov 27 19:34:29 EST 2012
kill -USR1 8767
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8767 killed at Tue Nov 27 19:34:29 EST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:34:29 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:29 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8845 >/dev/null 2>/dev/null
selfserv with PID 8845 found at Tue Nov 27 19:34:29 EST 2012
selfserv with PID 8845 started at Tue Nov 27 19:34:29 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C c -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:29 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:34:30 EST 2012
ssl.sh: #9749: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8845 at Tue Nov 27 19:34:30 EST 2012
kill -USR1 8845
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8845 killed at Tue Nov 27 19:34:30 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:34:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 8923 >/dev/null 2>/dev/null
selfserv with PID 8923 found at Tue Nov 27 19:34:30 EST 2012
selfserv with PID 8923 started at Tue Nov 27 19:34:30 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C c \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:30 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:34:30 EST 2012
ssl.sh: #9750: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 8923 at Tue Nov 27 19:34:30 EST 2012
kill -USR1 8923
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 8923 killed at Tue Nov 27 19:34:30 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 19:34:30 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:30 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9001 >/dev/null 2>/dev/null
selfserv with PID 9001 found at Tue Nov 27 19:34:30 EST 2012
selfserv with PID 9001 started at Tue Nov 27 19:34:30 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C c -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:30 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:34:31 EST 2012
ssl.sh: #9751: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9001 at Tue Nov 27 19:34:31 EST 2012
kill -USR1 9001
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9001 killed at Tue Nov 27 19:34:31 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 19:34:31 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:31 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9079 >/dev/null 2>/dev/null
selfserv with PID 9079 found at Tue Nov 27 19:34:31 EST 2012
selfserv with PID 9079 started at Tue Nov 27 19:34:31 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:31 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:34:32 EST 2012
ssl.sh: #9752: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9079 at Tue Nov 27 19:34:32 EST 2012
kill -USR1 9079
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9079 killed at Tue Nov 27 19:34:32 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 19:34:32 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9157 >/dev/null 2>/dev/null
selfserv with PID 9157 found at Tue Nov 27 19:34:32 EST 2012
selfserv with PID 9157 started at Tue Nov 27 19:34:32 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:32 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:34:32 EST 2012
ssl.sh: #9753: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9157 at Tue Nov 27 19:34:32 EST 2012
kill -USR1 9157
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9157 killed at Tue Nov 27 19:34:32 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 19:34:32 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:32 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9235 >/dev/null 2>/dev/null
selfserv with PID 9235 found at Tue Nov 27 19:34:32 EST 2012
selfserv with PID 9235 started at Tue Nov 27 19:34:32 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:32 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:34:33 EST 2012
ssl.sh: #9754: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9235 at Tue Nov 27 19:34:33 EST 2012
kill -USR1 9235
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9235 killed at Tue Nov 27 19:34:33 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 19:34:33 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:33 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9313 >/dev/null 2>/dev/null
selfserv with PID 9313 found at Tue Nov 27 19:34:33 EST 2012
selfserv with PID 9313 started at Tue Nov 27 19:34:33 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:33 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:34:33 EST 2012
ssl.sh: #9755: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9313 at Tue Nov 27 19:34:33 EST 2012
kill -USR1 9313
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9313 killed at Tue Nov 27 19:34:33 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Tue Nov 27 19:34:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9397 >/dev/null 2>/dev/null
selfserv with PID 9397 found at Tue Nov 27 19:34:34 EST 2012
selfserv with PID 9397 started at Tue Nov 27 19:34:34 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:34 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:34:34 EST 2012
ssl.sh: #9756: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9397 at Tue Nov 27 19:34:34 EST 2012
kill -USR1 9397
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9397 killed at Tue Nov 27 19:34:34 EST 2012
ssl.sh: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:34:34 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:34 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9496 >/dev/null 2>/dev/null
selfserv with PID 9496 found at Tue Nov 27 19:34:34 EST 2012
selfserv with PID 9496 started at Tue Nov 27 19:34:34 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C A -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:34 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: SSL2 - 100 server certificates tested.
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:34:35 EST 2012
ssl.sh: #9757: Stress SSL2 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9496 at Tue Nov 27 19:34:35 EST 2012
kill -USR1 9496
selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9496 killed at Tue Nov 27 19:34:35 EST 2012
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:34:35 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:35 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9574 >/dev/null 2>/dev/null
selfserv with PID 9574 found at Tue Nov 27 19:34:35 EST 2012
selfserv with PID 9574 started at Tue Nov 27 19:34:35 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C c -V :ssl3 -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:35 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:34:36 EST 2012
ssl.sh: #9758: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9574 at Tue Nov 27 19:34:36 EST 2012
kill -USR1 9574
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9574 killed at Tue Nov 27 19:34:36 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:34:36 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:36 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9651 >/dev/null 2>/dev/null
selfserv with PID 9651 found at Tue Nov 27 19:34:36 EST 2012
selfserv with PID 9651 started at Tue Nov 27 19:34:36 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:36 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:34:37 EST 2012
ssl.sh: #9759: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9651 at Tue Nov 27 19:34:37 EST 2012
kill -USR1 9651
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9651 killed at Tue Nov 27 19:34:37 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:34:37 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:37 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9728 >/dev/null 2>/dev/null
selfserv with PID 9728 found at Tue Nov 27 19:34:37 EST 2012
selfserv with PID 9728 started at Tue Nov 27 19:34:37 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:37 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:34:38 EST 2012
ssl.sh: #9760: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9728 at Tue Nov 27 19:34:38 EST 2012
kill -USR1 9728
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9728 killed at Tue Nov 27 19:34:38 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 19:34:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9806 >/dev/null 2>/dev/null
selfserv with PID 9806 found at Tue Nov 27 19:34:38 EST 2012
selfserv with PID 9806 started at Tue Nov 27 19:34:38 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:38 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:34:38 EST 2012
ssl.sh: #9761: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9806 at Tue Nov 27 19:34:38 EST 2012
kill -USR1 9806
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9806 killed at Tue Nov 27 19:34:38 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:34:38 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:38 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9884 >/dev/null 2>/dev/null
selfserv with PID 9884 found at Tue Nov 27 19:34:38 EST 2012
selfserv with PID 9884 started at Tue Nov 27 19:34:38 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:38 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:34:38 EST 2012
ssl.sh: #9762: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9884 at Tue Nov 27 19:34:39 EST 2012
kill -USR1 9884
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9884 killed at Tue Nov 27 19:34:39 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 19:34:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 9962 >/dev/null 2>/dev/null
selfserv with PID 9962 found at Tue Nov 27 19:34:39 EST 2012
selfserv with PID 9962 started at Tue Nov 27 19:34:39 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:39 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:34:39 EST 2012
ssl.sh: #9763: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 9962 at Tue Nov 27 19:34:39 EST 2012
kill -USR1 9962
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 9962 killed at Tue Nov 27 19:34:39 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:34:39 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:39 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10041 >/dev/null 2>/dev/null
selfserv with PID 10041 found at Tue Nov 27 19:34:39 EST 2012
selfserv with PID 10041 started at Tue Nov 27 19:34:39 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C c -n TestUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:39 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:34:39 EST 2012
ssl.sh: #9764: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10041 at Tue Nov 27 19:34:39 EST 2012
kill -USR1 10041
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10041 killed at Tue Nov 27 19:34:39 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Tue Nov 27 19:34:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10125 >/dev/null 2>/dev/null
selfserv with PID 10125 found at Tue Nov 27 19:34:40 EST 2012
selfserv with PID 10125 started at Tue Nov 27 19:34:40 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:40 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:34:40 EST 2012
ssl.sh: #9765: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10125 at Tue Nov 27 19:34:40 EST 2012
kill -USR1 10125
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10125 killed at Tue Nov 27 19:34:40 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Tue Nov 27 19:34:40 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -a buildnss02-sni.usersys.redhat.com -k buildnss02-sni.usersys.redhat.com -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:40 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10209 >/dev/null 2>/dev/null
selfserv with PID 10209 found at Tue Nov 27 19:34:40 EST 2012
selfserv with PID 10209 started at Tue Nov 27 19:34:40 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V tls1.0: -c 1000 -C c -u -a buildnss02-sni.usersys.redhat.com \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:40 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:34:41 EST 2012
ssl.sh: #9766: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10209 at Tue Nov 27 19:34:41 EST 2012
kill -USR1 10209
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10209 killed at Tue Nov 27 19:34:41 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:34:41 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:41 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10308 >/dev/null 2>/dev/null
selfserv with PID 10308 found at Tue Nov 27 19:34:41 EST 2012
selfserv with PID 10308 started at Tue Nov 27 19:34:41 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:41 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:34:42 EST 2012
ssl.sh: #9767: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10308 at Tue Nov 27 19:34:42 EST 2012
kill -USR1 10308
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10308 killed at Tue Nov 27 19:34:42 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:34:42 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:42 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10385 >/dev/null 2>/dev/null
selfserv with PID 10385 found at Tue Nov 27 19:34:42 EST 2012
selfserv with PID 10385 started at Tue Nov 27 19:34:42 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:42 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:34:43 EST 2012
ssl.sh: #9768: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10385 at Tue Nov 27 19:34:43 EST 2012
kill -USR1 10385
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10385 killed at Tue Nov 27 19:34:43 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:34:43 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:43 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10463 >/dev/null 2>/dev/null
selfserv with PID 10463 found at Tue Nov 27 19:34:43 EST 2012
selfserv with PID 10463 started at Tue Nov 27 19:34:43 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:43 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:34:44 EST 2012
ssl.sh: #9769: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10463 at Tue Nov 27 19:34:44 EST 2012
kill -USR1 10463
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10463 killed at Tue Nov 27 19:34:44 EST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:34:44 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:44 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10540 >/dev/null 2>/dev/null
selfserv with PID 10540 found at Tue Nov 27 19:34:44 EST 2012
selfserv with PID 10540 started at Tue Nov 27 19:34:44 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:44 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:34:45 EST 2012
ssl.sh: #9770: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10540 at Tue Nov 27 19:34:45 EST 2012
kill -USR1 10540
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10540 killed at Tue Nov 27 19:34:45 EST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:34:45 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:45 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10618 >/dev/null 2>/dev/null
selfserv with PID 10618 found at Tue Nov 27 19:34:45 EST 2012
selfserv with PID 10618 started at Tue Nov 27 19:34:45 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:45 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:34:46 EST 2012
ssl.sh: #9771: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10618 at Tue Nov 27 19:34:46 EST 2012
kill -USR1 10618
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10618 killed at Tue Nov 27 19:34:46 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 19:34:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10696 >/dev/null 2>/dev/null
selfserv with PID 10696 found at Tue Nov 27 19:34:46 EST 2012
selfserv with PID 10696 started at Tue Nov 27 19:34:46 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:46 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:34:46 EST 2012
ssl.sh: #9772: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10696 at Tue Nov 27 19:34:46 EST 2012
kill -USR1 10696
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10696 killed at Tue Nov 27 19:34:46 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:34:46 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:46 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10795 >/dev/null 2>/dev/null
selfserv with PID 10795 found at Tue Nov 27 19:34:46 EST 2012
selfserv with PID 10795 started at Tue Nov 27 19:34:46 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:46 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:34:47 EST 2012
ssl.sh: #9773: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10795 at Tue Nov 27 19:34:47 EST 2012
kill -USR1 10795
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10795 killed at Tue Nov 27 19:34:47 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 19:34:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10872 >/dev/null 2>/dev/null
selfserv with PID 10872 found at Tue Nov 27 19:34:47 EST 2012
selfserv with PID 10872 started at Tue Nov 27 19:34:47 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:47 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:34:47 EST 2012
ssl.sh: #9774: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10872 at Tue Nov 27 19:34:47 EST 2012
kill -USR1 10872
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10872 killed at Tue Nov 27 19:34:47 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:34:47 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:47 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 10951 >/dev/null 2>/dev/null
selfserv with PID 10951 found at Tue Nov 27 19:34:48 EST 2012
selfserv with PID 10951 started at Tue Nov 27 19:34:48 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 10 -C :C004 -N -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:48 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:34:48 EST 2012
ssl.sh: #9775: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 10951 at Tue Nov 27 19:34:48 EST 2012
kill -USR1 10951
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 10951 killed at Tue Nov 27 19:34:48 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:34:48 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:48 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11028 >/dev/null 2>/dev/null
selfserv with PID 11028 found at Tue Nov 27 19:34:48 EST 2012
selfserv with PID 11028 started at Tue Nov 27 19:34:48 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 10 -C :C00E -N -n TestUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:48 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:34:49 EST 2012
ssl.sh: #9776: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11028 at Tue Nov 27 19:34:49 EST 2012
kill -USR1 11028
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11028 killed at Tue Nov 27 19:34:49 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 19:34:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11105 >/dev/null 2>/dev/null
selfserv with PID 11105 found at Tue Nov 27 19:34:49 EST 2012
selfserv with PID 11105 started at Tue Nov 27 19:34:49 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -c 100 -C :C013 -n TestUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:49 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:34:49 EST 2012
ssl.sh: #9777: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11105 at Tue Nov 27 19:34:49 EST 2012
kill -USR1 11105
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11105 killed at Tue Nov 27 19:34:49 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:34:49 EST 2012
selfserv -D -p 8543 -d ../server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:49 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11183 >/dev/null 2>/dev/null
selfserv with PID 11183 found at Tue Nov 27 19:34:49 EST 2012
selfserv with PID 11183 started at Tue Nov 27 19:34:49 EST 2012
strsclnt -q -p 8543 -d ../client -B -s -w nss -V ssl3: -c 100 -C :C013 -n TestUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:49 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:34:50 EST 2012
ssl.sh: #9778: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11183 at Tue Nov 27 19:34:50 EST 2012
kill -USR1 11183
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11183 killed at Tue Nov 27 19:34:50 EST 2012
ssl.sh: SSL Stress Test Extended Test - server bypass/client bypass  - with ECC ===============================
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:34:50 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11335 >/dev/null 2>/dev/null
selfserv with PID 11335 found at Tue Nov 27 19:34:50 EST 2012
selfserv with PID 11335 started at Tue Nov 27 19:34:50 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 1000 -C c -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:50 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:34:50 EST 2012
ssl.sh: #9779: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11335 at Tue Nov 27 19:34:50 EST 2012
kill -USR1 11335
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11335 killed at Tue Nov 27 19:34:50 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 ----
selfserv starting at Tue Nov 27 19:34:50 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:50 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11413 >/dev/null 2>/dev/null
selfserv with PID 11413 found at Tue Nov 27 19:34:50 EST 2012
selfserv with PID 11413 started at Tue Nov 27 19:34:50 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 1000 -C c \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:50 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:34:51 EST 2012
ssl.sh: #9780: Stress TLS  RC4 128 with MD5 produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11413 at Tue Nov 27 19:34:51 EST 2012
kill -USR1 11413
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11413 killed at Tue Nov 27 19:34:51 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (false start) ----
selfserv starting at Tue Nov 27 19:34:51 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss   -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:51 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11491 >/dev/null 2>/dev/null
selfserv with PID 11491 found at Tue Nov 27 19:34:51 EST 2012
selfserv with PID 11491 started at Tue Nov 27 19:34:51 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 1000 -C c -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:51 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:34:51 EST 2012
ssl.sh: #9781: Stress TLS  RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11491 at Tue Nov 27 19:34:52 EST 2012
kill -USR1 11491
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11491 killed at Tue Nov 27 19:34:52 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket) ----
selfserv starting at Tue Nov 27 19:34:52 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11569 >/dev/null 2>/dev/null
selfserv with PID 11569 found at Tue Nov 27 19:34:52 EST 2012
selfserv with PID 11569 started at Tue Nov 27 19:34:52 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:52 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:34:52 EST 2012
ssl.sh: #9782: Stress TLS  RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11569 at Tue Nov 27 19:34:52 EST 2012
kill -USR1 11569
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11569 killed at Tue Nov 27 19:34:52 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (compression) ----
selfserv starting at Tue Nov 27 19:34:52 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:52 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11649 >/dev/null 2>/dev/null
selfserv with PID 11649 found at Tue Nov 27 19:34:52 EST 2012
selfserv with PID 11649 started at Tue Nov 27 19:34:52 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:52 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:34:53 EST 2012
ssl.sh: #9783: Stress TLS  RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11649 at Tue Nov 27 19:34:53 EST 2012
kill -USR1 11649
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11649 killed at Tue Nov 27 19:34:53 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Tue Nov 27 19:34:53 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:53 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11727 >/dev/null 2>/dev/null
selfserv with PID 11727 found at Tue Nov 27 19:34:53 EST 2012
selfserv with PID 11727 started at Tue Nov 27 19:34:53 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:53 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:34:54 EST 2012
ssl.sh: #9784: Stress TLS  RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11727 at Tue Nov 27 19:34:54 EST 2012
kill -USR1 11727
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11727 killed at Tue Nov 27 19:34:54 EST 2012
ssl.sh: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Tue Nov 27 19:34:54 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11807 >/dev/null 2>/dev/null
selfserv with PID 11807 found at Tue Nov 27 19:34:54 EST 2012
selfserv with PID 11807 started at Tue Nov 27 19:34:54 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C c -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:34:54 EST 2012
ssl.sh: #9785: Stress TLS  RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11807 at Tue Nov 27 19:34:54 EST 2012
kill -USR1 11807
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11807 killed at Tue Nov 27 19:34:54 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: skipping  Stress SSL2 RC4 128 with MD5 (no reuse, client auth) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:34:54 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:54 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11915 >/dev/null 2>/dev/null
selfserv with PID 11915 found at Tue Nov 27 19:34:54 EST 2012
selfserv with PID 11915 started at Tue Nov 27 19:34:54 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C c -V :ssl3 -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:54 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:34:56 EST 2012
ssl.sh: #9786: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11915 at Tue Nov 27 19:34:56 EST 2012
kill -USR1 11915
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11915 killed at Tue Nov 27 19:34:56 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:34:56 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:56 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 11992 >/dev/null 2>/dev/null
selfserv with PID 11992 found at Tue Nov 27 19:34:56 EST 2012
selfserv with PID 11992 started at Tue Nov 27 19:34:56 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:56 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:34:58 EST 2012
ssl.sh: #9787: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 11992 at Tue Nov 27 19:34:58 EST 2012
kill -USR1 11992
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 11992 killed at Tue Nov 27 19:34:58 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:34:58 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:58 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12069 >/dev/null 2>/dev/null
selfserv with PID 12069 found at Tue Nov 27 19:34:58 EST 2012
selfserv with PID 12069 started at Tue Nov 27 19:34:58 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:58 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:34:59 EST 2012
ssl.sh: #9788: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12069 at Tue Nov 27 19:34:59 EST 2012
kill -USR1 12069
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12069 killed at Tue Nov 27 19:34:59 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Tue Nov 27 19:34:59 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12147 >/dev/null 2>/dev/null
selfserv with PID 12147 found at Tue Nov 27 19:34:59 EST 2012
selfserv with PID 12147 started at Tue Nov 27 19:34:59 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:59 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:34:59 EST 2012
ssl.sh: #9789: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12147 at Tue Nov 27 19:34:59 EST 2012
kill -USR1 12147
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12147 killed at Tue Nov 27 19:34:59 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:34:59 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:34:59 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12225 >/dev/null 2>/dev/null
selfserv with PID 12225 found at Tue Nov 27 19:34:59 EST 2012
selfserv with PID 12225 started at Tue Nov 27 19:34:59 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:34:59 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:35:00 EST 2012
ssl.sh: #9790: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12225 at Tue Nov 27 19:35:00 EST 2012
kill -USR1 12225
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12225 killed at Tue Nov 27 19:35:00 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Tue Nov 27 19:35:00 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:35:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12304 >/dev/null 2>/dev/null
selfserv with PID 12304 found at Tue Nov 27 19:35:00 EST 2012
selfserv with PID 12304 started at Tue Nov 27 19:35:00 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:35:00 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:35:00 EST 2012
ssl.sh: #9791: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12304 at Tue Nov 27 19:35:00 EST 2012
kill -USR1 12304
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12304 killed at Tue Nov 27 19:35:00 EST 2012
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Tue Nov 27 19:35:00 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -u -z -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:35:00 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12382 >/dev/null 2>/dev/null
selfserv with PID 12382 found at Tue Nov 27 19:35:00 EST 2012
selfserv with PID 12382 started at Tue Nov 27 19:35:00 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C c -n ExtendedSSLUser -u -z -g \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:35:00 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:35:01 EST 2012
ssl.sh: #9792: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12382 at Tue Nov 27 19:35:01 EST 2012
kill -USR1 12382
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12382 killed at Tue Nov 27 19:35:01 EST 2012
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping  Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:35:01 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:35:01 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12491 >/dev/null 2>/dev/null
selfserv with PID 12491 found at Tue Nov 27 19:35:01 EST 2012
selfserv with PID 12491 started at Tue Nov 27 19:35:01 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C :C009 -N -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:35:01 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:35:02 EST 2012
ssl.sh: #9793: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12491 at Tue Nov 27 19:35:02 EST 2012
kill -USR1 12491
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12491 killed at Tue Nov 27 19:35:02 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:35:02 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:35:02 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12568 >/dev/null 2>/dev/null
selfserv with PID 12568 found at Tue Nov 27 19:35:02 EST 2012
selfserv with PID 12568 started at Tue Nov 27 19:35:02 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 1000 -C :C013 -V :ssl3 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:35:02 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:35:03 EST 2012
ssl.sh: #9794: Stress SSL3 ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12568 at Tue Nov 27 19:35:03 EST 2012
kill -USR1 12568
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12568 killed at Tue Nov 27 19:35:03 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:35:03 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:35:03 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12646 >/dev/null 2>/dev/null
selfserv with PID 12646 found at Tue Nov 27 19:35:03 EST 2012
selfserv with PID 12646 started at Tue Nov 27 19:35:03 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C004 -N \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:35:03 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:35:04 EST 2012
ssl.sh: #9795: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12646 at Tue Nov 27 19:35:04 EST 2012
kill -USR1 12646
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12646 killed at Tue Nov 27 19:35:04 EST 2012
ssl.sh: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) ----
selfserv starting at Tue Nov 27 19:35:04 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:35:04 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12723 >/dev/null 2>/dev/null
selfserv with PID 12723 found at Tue Nov 27 19:35:04 EST 2012
selfserv with PID 12723 started at Tue Nov 27 19:35:04 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C00E -N \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:35:04 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Tue Nov 27 19:35:06 EST 2012
ssl.sh: #9796: Stress TLS  ECDH-RSA    AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12723 at Tue Nov 27 19:35:06 EST 2012
kill -USR1 12723
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12723 killed at Tue Nov 27 19:35:06 EST 2012
ssl.sh: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA ----
selfserv starting at Tue Nov 27 19:35:06 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:35:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12800 >/dev/null 2>/dev/null
selfserv with PID 12800 found at Tue Nov 27 19:35:06 EST 2012
selfserv with PID 12800 started at Tue Nov 27 19:35:06 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C013 \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:35:06 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:35:06 EST 2012
ssl.sh: #9797: Stress TLS  ECDHE-RSA   AES 128 CBC with SHA produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12800 at Tue Nov 27 19:35:06 EST 2012
kill -USR1 12800
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12800 killed at Tue Nov 27 19:35:06 EST 2012
ssl.sh: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) ----
selfserv starting at Tue Nov 27 19:35:06 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -c :C004 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:35:06 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12878 >/dev/null 2>/dev/null
selfserv with PID 12878 found at Tue Nov 27 19:35:06 EST 2012
selfserv with PID 12878 started at Tue Nov 27 19:35:06 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 1000 -C :C004 -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:35:06 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes
strsclnt completed at Tue Nov 27 19:35:07 EST 2012
ssl.sh: #9798: Stress TLS  ECDH-ECDSA  AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12878 at Tue Nov 27 19:35:07 EST 2012
kill -USR1 12878
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
          999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12878 killed at Tue Nov 27 19:35:07 EST 2012
ssl.sh: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:35:07 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C009 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:35:07 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 12977 >/dev/null 2>/dev/null
selfserv with PID 12977 found at Tue Nov 27 19:35:07 EST 2012
selfserv with PID 12977 started at Tue Nov 27 19:35:07 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 10 -C :C009 -N -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:35:07 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:35:08 EST 2012
ssl.sh: #9799: Stress SSL3 ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 12977 at Tue Nov 27 19:35:08 EST 2012
kill -USR1 12977
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 12977 killed at Tue Nov 27 19:35:08 EST 2012
ssl.sh: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Tue Nov 27 19:35:08 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:35:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13054 >/dev/null 2>/dev/null
selfserv with PID 13054 found at Tue Nov 27 19:35:08 EST 2012
selfserv with PID 13054 started at Tue Nov 27 19:35:08 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C :C013 -V :ssl3 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:35:08 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:35:08 EST 2012
ssl.sh: #9800: Stress SSL3 ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13054 at Tue Nov 27 19:35:08 EST 2012
kill -USR1 13054
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13054 killed at Tue Nov 27 19:35:08 EST 2012
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:35:08 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C004 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:35:08 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13132 >/dev/null 2>/dev/null
selfserv with PID 13132 found at Tue Nov 27 19:35:08 EST 2012
selfserv with PID 13132 started at Tue Nov 27 19:35:08 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:35:08 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:35:09 EST 2012
ssl.sh: #9801: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13132 at Tue Nov 27 19:35:09 EST 2012
kill -USR1 13132
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13132 killed at Tue Nov 27 19:35:09 EST 2012
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Tue Nov 27 19:35:09 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ecmixed -w nss -r -r -c :C00E -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:35:09 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13209 >/dev/null 2>/dev/null
selfserv with PID 13209 found at Tue Nov 27 19:35:09 EST 2012
selfserv with PID 13209 started at Tue Nov 27 19:35:09 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:35:09 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Tue Nov 27 19:35:10 EST 2012
ssl.sh: #9802: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13209 at Tue Nov 27 19:35:10 EST 2012
kill -USR1 13209
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13209 killed at Tue Nov 27 19:35:10 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Tue Nov 27 19:35:10 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:35:10 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13286 >/dev/null 2>/dev/null
selfserv with PID 13286 found at Tue Nov 27 19:35:10 EST 2012
selfserv with PID 13286 started at Tue Nov 27 19:35:10 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -c 100 -C :C013 -n ExtendedSSLUser-ec \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:35:10 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt completed at Tue Nov 27 19:35:11 EST 2012
ssl.sh: #9803: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13286 at Tue Nov 27 19:35:11 EST 2012
kill -USR1 13286
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13286 killed at Tue Nov 27 19:35:11 EST 2012
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Tue Nov 27 19:35:11 EST 2012
selfserv -D -p 8543 -d ../ext_server -n buildnss02.usersys.redhat.com -B -s \
         -e buildnss02.usersys.redhat.com-ec -w nss -r -r -c :C013 -u -i ../tests_pid.12297  &
trying to connect to selfserv at Tue Nov 27 19:35:11 EST 2012
tstclnt -p 8543 -h buildnss02.usersys.redhat.com -B -s -q \
        -d ../ext_client -v < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/ssl/sslreq.dat
tstclnt: connecting to buildnss02.usersys.redhat.com:8543 (address=10.16.79.157)
kill -0 13364 >/dev/null 2>/dev/null
selfserv with PID 13364 found at Tue Nov 27 19:35:11 EST 2012
selfserv with PID 13364 started at Tue Nov 27 19:35:11 EST 2012
strsclnt -q -p 8543 -d ../ext_client -B -s -w nss -V ssl3: -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
          buildnss02.usersys.redhat.com
strsclnt started at Tue Nov 27 19:35:11 EST 2012
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
          0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes
strsclnt completed at Tue Nov 27 19:35:11 EST 2012
ssl.sh: #9804: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0.  - PASSED
trying to kill selfserv with PID 13364 at Tue Nov 27 19:35:11 EST 2012
kill -USR1 13364
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
          99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8543 2>/dev/null;
selfserv with PID 13364 killed at Tue Nov 27 19:35:11 EST 2012
TIMESTAMP ssl END: Tue Nov 27 19:35:11 EST 2012
Running tests for merge
TIMESTAMP merge BEGIN: Tue Nov 27 19:35:11 EST 2012
sdr.sh: SDR Tests ===============================
sdr.sh: Creating an SDR key/SDR Encrypt - Value 1
sdrtest -d . -o /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests.v1.12297 -t "Test1"
sdr.sh: #9805: Creating SDR Key/Encrypt - Value 1  - PASSED
sdr.sh: SDR Encrypt - Value 2
sdrtest -d . -o /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests.v2.12297 -t "The quick brown fox jumped over the lazy dog"
sdr.sh: #9806: Encrypt - Value 2  - PASSED
sdr.sh: SDR Encrypt - Value 3
sdrtest -d . -o /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests.v3.12297 -t "1234567"
sdr.sh: #9807: Encrypt - Value 3  - PASSED
sdr.sh: SDR Decrypt - Value 1
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests.v1.12297 -t "Test1"
sdr.sh: #9808: Decrypt - Value 1  - PASSED
sdr.sh: SDR Decrypt - Value 2
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests.v2.12297 -t "The quick brown fox jumped over the lazy dog"
sdr.sh: #9809: Decrypt - Value 2  - PASSED
sdr.sh: SDR Decrypt - Value 3
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests.v3.12297 -t "1234567"
sdr.sh: #9810: Decrypt - Value 3  - PASSED
merge.sh: Merge Tests ===============================
merge.sh: Creating an SDR key & Encrypt
sdrtest -d . -o /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests.v3.12297 -t Test2 -f ../tests.pw
merge.sh: #9811: Creating SDR Key  - PASSED
merge.sh: Merging in Key for Existing user
certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #9812: Merging Dave  - PASSED
merge.sh: Merging in new user 
certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #9813: Merging server  - PASSED
merge.sh: Merging in new chain 
certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #9814: Merging ext_client  - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #9815: Merging conflicting nicknames 1  - PASSED
merge.sh: Merging in conflicting nicknames 1
certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #9816: Merging conflicting nicknames 2  - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #4)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 45 (0x2d)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:28:31 2012
            Not After : Tue Nov 28 00:28:31 2017
        Subject: "CN=TestUser45,E=TestUser45@bogus.com,O=BOGUS NSS,L=Mountain
             View,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ca:a5:a2:e1:33:94:8f:9c:8a:d5:7a:35:5e:3b:d6:6e:
                    53:90:cd:e1:12:6c:31:7d:7c:f3:4d:2f:22:4a:1e:eb:
                    46:a9:a1:67:ed:19:e2:a3:4b:81:d3:28:2e:1f:98:7d:
                    f2:f4:19:dd:2d:43:b9:b5:be:6d:3d:04:10:31:1f:1f:
                    d9:17:cf:40:5b:33:9e:37:14:3f:34:c7:49:b1:b2:60:
                    2b:74:11:3e:5d:73:f1:4d:7b:01:01:b5:00:bc:04:2e:
                    05:13:ee:1e:59:d5:ca:20:06:b3:09:7a:c7:e6:72:f8:
                    c4:67:f7:b5:34:8d:55:1a:ee:97:45:7c:57:45:64:e9
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        4c:67:bb:f4:56:9f:17:af:f4:e3:1c:33:42:7f:e3:68:
        3e:3d:a7:e2:25:9d:1d:a3:48:e2:b3:a6:78:bf:bb:4f:
        70:9c:74:b9:e2:ec:2a:50:86:7d:c7:d1:bc:2d:c7:c0:
        78:7a:2a:cf:88:80:2c:e5:b8:d1:ea:96:9d:48:0b:e4:
        63:04:45:c0:2a:0c:80:88:60:3c:33:45:7d:af:56:94:
        9f:0b:4a:3c:6f:4b:32:84:58:f2:58:5d:a0:b9:55:d8:
        60:d7:07:0c:bd:85:76:b5:c0:25:19:21:ac:83:2a:dc:
        54:24:ff:31:4c:4f:ad:aa:cc:8f:4b:2e:52:08:72:87
    Fingerprint (MD5):
        6D:33:28:D1:A9:AE:4C:76:0F:F5:2F:BF:67:6F:B6:2D
    Fingerprint (SHA1):
        64:B3:00:B4:19:69:FB:6E:2A:D7:6C:28:15:6F:57:34:15:D8:5F:C9

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

merge.sh: #9817: Verify nicknames were deconflicted (Alice #4)  - PASSED
merge.sh: Verify nicknames were deconflicted (Alice #100)
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 46 (0x2e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Nov 28 00:28:36 2012
            Not After : Tue Nov 28 00:28:36 2017
        Subject: "CN=TestUser46,E=TestUser46@bogus.com,O=BOGUS NSS,L=Mountain
             View,ST=California,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ca:82:fa:c2:d6:79:61:f2:dd:1c:8a:c2:67:ec:f2:3d:
                    02:19:96:e9:24:9d:23:f5:be:cd:aa:71:e5:00:d7:aa:
                    2f:4f:dd:ea:e8:d3:ba:56:dd:d8:4a:47:e9:07:2b:e1:
                    80:95:fe:5b:ba:0f:46:33:7b:d3:d6:7a:c0:e5:82:96:
                    14:bc:bf:86:5d:c2:b7:0a:47:08:af:43:24:c8:16:03:
                    74:c3:6e:75:12:7d:18:71:65:4d:17:9c:50:1f:29:3f:
                    fb:60:8f:e8:eb:dd:52:8d:fc:88:1e:5c:f9:bf:d3:e5:
                    b0:13:cc:9d:98:4f:98:82:b1:cd:7f:70:35:72:34:cf
                Exponent: 65537 (0x10001)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        82:18:a8:2a:6e:55:45:0f:46:0c:ef:7d:b8:5a:87:83:
        de:39:8b:18:08:3e:7b:63:2c:18:12:d3:8b:bd:96:a2:
        6e:e7:8c:b3:97:fd:40:2e:cf:ec:10:23:35:80:98:cc:
        37:f3:7b:24:a8:1d:51:e5:a0:70:32:23:54:eb:06:d7:
        3c:d4:e1:31:96:12:65:5d:88:35:14:a5:b7:0c:c1:9f:
        7a:3f:d1:61:cd:80:28:cf:67:98:bd:65:ab:c0:05:d7:
        5f:1a:09:ad:03:22:da:bc:2c:d5:cd:36:07:92:67:24:
        e0:bc:a7:25:1b:00:1d:d1:8c:55:cf:21:0c:53:8e:f0
    Fingerprint (MD5):
        E7:2D:02:3E:F9:47:E2:17:A2:83:BF:94:F3:3E:6D:FF
    Fingerprint (SHA1):
        BF:83:A6:82:D6:DA:47:65:F8:27:02:3A:DF:DB:86:B9:18:15:0F:35

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

merge.sh: #9818: Verify nicknames were deconflicted (Alice #100)  - PASSED
merge.sh: Merging in SDR 
certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw
merge.sh: #9819: Merging SDR  - PASSED

Certificate Nickname                                         Trust Attributes
                                                             SSL,S/MIME,JAR/XPI

TestCA                                                       CT,C,C
TestCA-ec                                                    CT,C,C
Alice                                                        u,u,u
Alice-ec                                                     u,u,u
Alice-ecmixed                                                u,u,u
bob@bogus.com                                                ,,   
Dave                                                         u,u,u
eve@bogus.com                                                ,,   
bob-ec@bogus.com                                             ,,   
Dave-ec                                                      u,u,u
Dave-ecmixed                                                 u,u,u
buildnss02.usersys.redhat.com                                u,u,u
buildnss02.usersys.redhat.com-ec                             u,u,u
buildnss02.usersys.redhat.com-ecmixed                        u,u,u
buildnss02-sni.usersys.redhat.com                            u,u,u
buildnss02-sni.usersys.redhat.com-ec                         u,u,u
buildnss02-sni.usersys.redhat.com-ecmixed                    u,u,u
ExtendedSSLUser                                              u,u,u
serverCA                                                     C,C,C
ExtendedSSLUser-ec                                           u,u,u
serverCA-ec                                                  C,C,C
ExtendedSSLUser-ecmixed                                      u,u,u
chain-2-clientCA-ec                                          ,,   
clientCA                                                     T,C,C
chain-2-clientCA                                             ,,   
clientCA-ec                                                  T,C,C
chain-1-clientCA-ec                                          ,,   
chain-1-clientCA                                             ,,   
Alice #2                                                     ,,   
Alice #1                                                     ,,   
Alice #99                                                    ,,   
Alice #3                                                     ,,   
Alice #4                                                     ,,   
Alice #100                                                   ,,   


CRL names                                CRL Type

TestCA                                   CRL  
TestCA-ec                                CRL  
merge.sh: Decrypt - With Original SDR Key
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests.v3.12297 -t Test2 -f ../tests.pw
merge.sh: #9820: Decrypt - Value 3  - PASSED
merge.sh: Decrypt - With Merged SDR Key
sdrtest -d . -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests.v1.12297 -t Test1 -f ../tests.pw
merge.sh: #9821: Decrypt - Value 1  - PASSED
merge.sh: Signing with merged key  ------------------
cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig
merge.sh: #9822: Create Detached Signature Dave . - PASSED
cmsutil -D -i dave.dsig -c alice.txt -d . 
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com

This is a test message from Alice to Bob.
merge.sh: #9823: Verifying Dave's Detached Signature  - PASSED
merge.sh: verifying  merged cert  ------------------
certutil -V -n ExtendedSSLUser -u C -d .
certutil: certificate is valid
merge.sh: #9824: Verifying ExtendedSSL User Cert  - PASSED
merge.sh: verifying  merged crl  ------------------
crlutil -L -n TestCA -d .
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US"
    This Update: Wed Nov 28 00:29:10 2012
    Entry 1 (0x1):
        Serial Number: 40 (0x28)
        Revocation Date: Wed Nov 28 00:24:28 2012
        Entry Extensions:
            Name: CRL reason code

    Entry 2 (0x2):
        Serial Number: 42 (0x2a)
        Revocation Date: Wed Nov 28 00:29:07 2012
    CRL Extensions:
        Name: Certificate Issuer Alt Name
        RFC822 Name: "caemail@ca.com"
        DNS name: "ca.com"
        Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo
            rnia,C=US"
        URI: "http://ca.com"
        IP Address:
            87:0b:31:39:32:2e:31:36:38:2e:30:2e:31

merge.sh: #9825: Verifying TestCA CRL  - PASSED
TIMESTAMP merge END: Tue Nov 27 19:35:37 EST 2012
Running tests for chains
TIMESTAMP chains BEGIN: Tue Nov 27 19:35:37 EST 2012
~/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/aiahttp ~/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/chains
httpserv starting at Tue Nov 27 19:35:37 EST 2012
httpserv -D -p 8553  \
         -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/aiahttp/http_pid.12297  &
trying to connect to httpserv at Tue Nov 27 19:35:37 EST 2012
tstclnt -p 8553 -h buildnss02.usersys.redhat.com -q -v
tstclnt: connecting to buildnss02.usersys.redhat.com:8553 (address=10.16.79.157)
kill -0 13689 >/dev/null 2>/dev/null
httpserv with PID 13689 found at Tue Nov 27 19:35:37 EST 2012
httpserv with PID 13689 started at Tue Nov 27 19:35:37 EST 2012
~/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/chains
chains.sh: Certificate Chains Tests ===============================
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #9826: Bridge: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193538 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9827: Bridge: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #9828: Bridge: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #9829: Bridge: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193539 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9830: Bridge: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #9831: Bridge: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #9832: Bridge: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o BridgeReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9833: Bridge: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1127193540 -7 Bridge@Army  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9834: Bridge: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #9835: Bridge: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1127193541 -7 Bridge@Navy  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9836: Bridge: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #9837: Bridge: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #9838: Bridge: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #9839: Bridge: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9840: Bridge: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserBridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1127193542   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9841: Bridge: Creating certficate UserBridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate UserBridge.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der
chains.sh: #9842: Bridge: Importing certificate UserBridge.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #9843: Bridge: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Army.der to AllDB database
certutil -A -n Army  -t "" -d AllDB -f AllDB/dbpasswd -i Army.der
chains.sh: #9844: Bridge: Importing certificate Army.der to AllDB database  - PASSED
chains.sh: Importing certificate Navy.der to AllDB database
certutil -A -n Navy  -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der
chains.sh: #9845: Bridge: Importing certificate Navy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Navy
vfychain -d AllDB -pp -vv      UserBridge.der BridgeNavy.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193539 (0x432f9bc3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:35:41 2012
            Not After : Tue Nov 28 00:35:41 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:16:08:71:b3:14:a3:15:94:5a:fc:76:82:77:8c:b2:
                    37:98:55:19:5b:11:1f:32:8b:ed:2b:e6:fd:27:f2:c2:
                    1b:ce:61:ea:3a:3a:75:d0:16:ad:0b:6e:0a:37:48:68:
                    c6:4b:b6:23:28:e7:8d:cc:52:95:7d:f6:f5:c4:24:28:
                    ec:16:4d:a4:0a:1b:61:e8:d3:07:d4:0c:64:ef:50:45:
                    bf:ec:f1:d9:8f:9a:5f:95:7a:33:73:a6:79:3d:2c:16:
                    d7:f6:35:b1:6e:a1:c6:a3:41:91:d1:9d:fb:a1:58:23:
                    68:02:00:9a:90:c3:e4:06:6b:35:09:9f:ec:8c:bb:af
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9b:14:02:4f:8c:72:4d:27:2f:2d:81:dd:5b:63:62:5d:
        07:8a:0f:a3:34:03:f3:a5:ea:1f:6f:de:9b:90:13:c1:
        5c:05:63:3e:d8:d4:8f:98:7e:e2:a2:42:d5:35:b0:36:
        d8:d4:6e:6e:db:c4:8a:c8:8e:f3:67:af:9e:8f:06:b7:
        51:c8:f3:53:e8:d9:28:d3:63:ba:c0:23:41:a5:0e:bd:
        0b:c5:c7:90:0f:07:6a:2a:58:85:ba:34:79:08:10:bc:
        5b:0d:44:95:42:a1:ef:0c:cd:d2:d4:22:43:b6:20:7e:
        cc:07:a8:fc:b8:d0:05:75:97:9d:be:1f:4f:8e:12:47
    Fingerprint (MD5):
        14:25:59:29:56:10:DE:8E:C8:FC:45:8B:19:78:24:D7
    Fingerprint (SHA1):
        11:57:00:57:5B:8B:5D:28:68:7B:73:89:29:9B:2D:E8:57:BA:E0:E3

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9846: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Navy - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der BridgeArmy.der  -t Army
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193538 (0x432f9bc2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 00:35:39 2012
            Not After : Tue Nov 28 00:35:39 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cb:e9:5c:bf:34:37:4a:78:ee:c2:b6:ab:c5:60:e2:2b:
                    27:cd:01:95:4a:9f:48:b4:ff:a3:02:76:0c:b1:74:fb:
                    5d:46:a3:98:fa:ee:35:45:3f:38:35:b2:8c:34:36:d1:
                    0c:cc:72:df:71:9d:fd:85:a0:3d:28:73:20:01:69:fa:
                    e4:e1:ec:fd:34:44:b2:39:05:3c:e3:29:be:c9:ba:48:
                    4c:dd:fd:8a:ec:b1:ac:5e:3d:ac:c9:79:9d:92:e6:95:
                    af:6b:38:68:b4:b1:3b:ac:bf:e0:64:d1:82:34:79:29:
                    69:fb:83:b7:86:8b:37:c0:a2:bf:42:25:7a:ce:85:21
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        71:54:a3:72:3c:6e:d9:64:0d:fe:2f:26:c9:e5:8e:0c:
        e4:2d:37:65:56:c2:5d:bc:fa:6d:ad:df:99:e0:f1:b4:
        35:e9:f2:5d:e5:0e:53:70:d4:e8:4c:16:ba:1d:79:ec:
        f9:79:2b:3a:16:e5:bf:2f:c7:24:e5:01:85:5c:93:b5:
        26:82:3e:31:f9:01:63:55:0f:39:2f:2e:6d:b1:93:9d:
        57:d4:82:bf:2c:34:69:52:4e:c5:8d:b1:cf:5e:0d:bf:
        46:80:ae:f1:79:55:a6:a1:5b:90:cf:6e:f5:a3:d8:c3:
        e4:56:51:86:27:e4:60:8c:ea:1b:57:65:e8:5c:91:74
    Fingerprint (MD5):
        F7:DC:EA:E5:26:17:6D:A3:38:16:A1:CD:90:17:66:B1
    Fingerprint (SHA1):
        37:4E:CC:F6:5D:04:35:49:18:36:AA:BC:EE:DC:B0:FA:3C:3E:E9:B4

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9847: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der BridgeNavy.der  -t Army
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Navy [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #9848: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Importing certificate BridgeArmy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der
chains.sh: #9849: Bridge: Importing certificate BridgeArmy.der to AllDB database  - PASSED
chains.sh: Importing certificate BridgeNavy.der to AllDB database
certutil -A -n Bridge  -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der
chains.sh: #9850: Bridge: Importing certificate BridgeNavy.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Army
vfychain -d AllDB -pp -vv      UserBridge.der  -t Army
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193538 (0x432f9bc2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 00:35:39 2012
            Not After : Tue Nov 28 00:35:39 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cb:e9:5c:bf:34:37:4a:78:ee:c2:b6:ab:c5:60:e2:2b:
                    27:cd:01:95:4a:9f:48:b4:ff:a3:02:76:0c:b1:74:fb:
                    5d:46:a3:98:fa:ee:35:45:3f:38:35:b2:8c:34:36:d1:
                    0c:cc:72:df:71:9d:fd:85:a0:3d:28:73:20:01:69:fa:
                    e4:e1:ec:fd:34:44:b2:39:05:3c:e3:29:be:c9:ba:48:
                    4c:dd:fd:8a:ec:b1:ac:5e:3d:ac:c9:79:9d:92:e6:95:
                    af:6b:38:68:b4:b1:3b:ac:bf:e0:64:d1:82:34:79:29:
                    69:fb:83:b7:86:8b:37:c0:a2:bf:42:25:7a:ce:85:21
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        71:54:a3:72:3c:6e:d9:64:0d:fe:2f:26:c9:e5:8e:0c:
        e4:2d:37:65:56:c2:5d:bc:fa:6d:ad:df:99:e0:f1:b4:
        35:e9:f2:5d:e5:0e:53:70:d4:e8:4c:16:ba:1d:79:ec:
        f9:79:2b:3a:16:e5:bf:2f:c7:24:e5:01:85:5c:93:b5:
        26:82:3e:31:f9:01:63:55:0f:39:2f:2e:6d:b1:93:9d:
        57:d4:82:bf:2c:34:69:52:4e:c5:8d:b1:cf:5e:0d:bf:
        46:80:ae:f1:79:55:a6:a1:5b:90:cf:6e:f5:a3:d8:c3:
        e4:56:51:86:27:e4:60:8c:ea:1b:57:65:e8:5c:91:74
    Fingerprint (MD5):
        F7:DC:EA:E5:26:17:6D:A3:38:16:A1:CD:90:17:66:B1
    Fingerprint (SHA1):
        37:4E:CC:F6:5D:04:35:49:18:36:AA:BC:EE:DC:B0:FA:3C:3E:E9:B4

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9851: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Army - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Navy
vfychain -d AllDB -pp -vv      UserBridge.der  -t Navy
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193539 (0x432f9bc3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:35:41 2012
            Not After : Tue Nov 28 00:35:41 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:16:08:71:b3:14:a3:15:94:5a:fc:76:82:77:8c:b2:
                    37:98:55:19:5b:11:1f:32:8b:ed:2b:e6:fd:27:f2:c2:
                    1b:ce:61:ea:3a:3a:75:d0:16:ad:0b:6e:0a:37:48:68:
                    c6:4b:b6:23:28:e7:8d:cc:52:95:7d:f6:f5:c4:24:28:
                    ec:16:4d:a4:0a:1b:61:e8:d3:07:d4:0c:64:ef:50:45:
                    bf:ec:f1:d9:8f:9a:5f:95:7a:33:73:a6:79:3d:2c:16:
                    d7:f6:35:b1:6e:a1:c6:a3:41:91:d1:9d:fb:a1:58:23:
                    68:02:00:9a:90:c3:e4:06:6b:35:09:9f:ec:8c:bb:af
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9b:14:02:4f:8c:72:4d:27:2f:2d:81:dd:5b:63:62:5d:
        07:8a:0f:a3:34:03:f3:a5:ea:1f:6f:de:9b:90:13:c1:
        5c:05:63:3e:d8:d4:8f:98:7e:e2:a2:42:d5:35:b0:36:
        d8:d4:6e:6e:db:c4:8a:c8:8e:f3:67:af:9e:8f:06:b7:
        51:c8:f3:53:e8:d9:28:d3:63:ba:c0:23:41:a5:0e:bd:
        0b:c5:c7:90:0f:07:6a:2a:58:85:ba:34:79:08:10:bc:
        5b:0d:44:95:42:a1:ef:0c:cd:d2:d4:22:43:b6:20:7e:
        cc:07:a8:fc:b8:d0:05:75:97:9d:be:1f:4f:8e:12:47
    Fingerprint (MD5):
        14:25:59:29:56:10:DE:8E:C8:FC:45:8B:19:78:24:D7
    Fingerprint (SHA1):
        11:57:00:57:5B:8B:5D:28:68:7B:73:89:29:9B:2D:E8:57:BA:E0:E3

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9852: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d AllDB     -t Navy - PASSED
chains.sh: Creating DB ArmyOnlyDB
certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd
chains.sh: #9853: Bridge: Creating DB ArmyOnlyDB  - PASSED
chains.sh: Importing certificate Army.der to ArmyOnlyDB database
certutil -A -n Army  -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der
chains.sh: #9854: Bridge: Importing certificate Army.der to ArmyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #9855: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@navy [Certificate Authority]:
Email Address(es): bridge@navy
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #9856: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB    
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der Navy.der 
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Navy ROOT CA,O=Navy,C=US
Returned value is 1, expected result is fail
chains.sh: #9857: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der Navy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193539 (0x432f9bc3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:35:41 2012
            Not After : Tue Nov 28 00:35:41 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:16:08:71:b3:14:a3:15:94:5a:fc:76:82:77:8c:b2:
                    37:98:55:19:5b:11:1f:32:8b:ed:2b:e6:fd:27:f2:c2:
                    1b:ce:61:ea:3a:3a:75:d0:16:ad:0b:6e:0a:37:48:68:
                    c6:4b:b6:23:28:e7:8d:cc:52:95:7d:f6:f5:c4:24:28:
                    ec:16:4d:a4:0a:1b:61:e8:d3:07:d4:0c:64:ef:50:45:
                    bf:ec:f1:d9:8f:9a:5f:95:7a:33:73:a6:79:3d:2c:16:
                    d7:f6:35:b1:6e:a1:c6:a3:41:91:d1:9d:fb:a1:58:23:
                    68:02:00:9a:90:c3:e4:06:6b:35:09:9f:ec:8c:bb:af
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9b:14:02:4f:8c:72:4d:27:2f:2d:81:dd:5b:63:62:5d:
        07:8a:0f:a3:34:03:f3:a5:ea:1f:6f:de:9b:90:13:c1:
        5c:05:63:3e:d8:d4:8f:98:7e:e2:a2:42:d5:35:b0:36:
        d8:d4:6e:6e:db:c4:8a:c8:8e:f3:67:af:9e:8f:06:b7:
        51:c8:f3:53:e8:d9:28:d3:63:ba:c0:23:41:a5:0e:bd:
        0b:c5:c7:90:0f:07:6a:2a:58:85:ba:34:79:08:10:bc:
        5b:0d:44:95:42:a1:ef:0c:cd:d2:d4:22:43:b6:20:7e:
        cc:07:a8:fc:b8:d0:05:75:97:9d:be:1f:4f:8e:12:47
    Fingerprint (MD5):
        14:25:59:29:56:10:DE:8E:C8:FC:45:8B:19:78:24:D7
    Fingerprint (SHA1):
        11:57:00:57:5B:8B:5D:28:68:7B:73:89:29:9B:2D:E8:57:BA:E0:E3


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9858: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der Navy.der with flags  -d ArmyOnlyDB     -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     -t Navy.der
vfychain -d ArmyOnlyDB -pp -vv      UserBridge.der BridgeNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193539 (0x432f9bc3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:35:41 2012
            Not After : Tue Nov 28 00:35:41 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a1:16:08:71:b3:14:a3:15:94:5a:fc:76:82:77:8c:b2:
                    37:98:55:19:5b:11:1f:32:8b:ed:2b:e6:fd:27:f2:c2:
                    1b:ce:61:ea:3a:3a:75:d0:16:ad:0b:6e:0a:37:48:68:
                    c6:4b:b6:23:28:e7:8d:cc:52:95:7d:f6:f5:c4:24:28:
                    ec:16:4d:a4:0a:1b:61:e8:d3:07:d4:0c:64:ef:50:45:
                    bf:ec:f1:d9:8f:9a:5f:95:7a:33:73:a6:79:3d:2c:16:
                    d7:f6:35:b1:6e:a1:c6:a3:41:91:d1:9d:fb:a1:58:23:
                    68:02:00:9a:90:c3:e4:06:6b:35:09:9f:ec:8c:bb:af
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9b:14:02:4f:8c:72:4d:27:2f:2d:81:dd:5b:63:62:5d:
        07:8a:0f:a3:34:03:f3:a5:ea:1f:6f:de:9b:90:13:c1:
        5c:05:63:3e:d8:d4:8f:98:7e:e2:a2:42:d5:35:b0:36:
        d8:d4:6e:6e:db:c4:8a:c8:8e:f3:67:af:9e:8f:06:b7:
        51:c8:f3:53:e8:d9:28:d3:63:ba:c0:23:41:a5:0e:bd:
        0b:c5:c7:90:0f:07:6a:2a:58:85:ba:34:79:08:10:bc:
        5b:0d:44:95:42:a1:ef:0c:cd:d2:d4:22:43:b6:20:7e:
        cc:07:a8:fc:b8:d0:05:75:97:9d:be:1f:4f:8e:12:47
    Fingerprint (MD5):
        14:25:59:29:56:10:DE:8E:C8:FC:45:8B:19:78:24:D7
    Fingerprint (SHA1):
        11:57:00:57:5B:8B:5D:28:68:7B:73:89:29:9B:2D:E8:57:BA:E0:E3


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9859: Bridge: Verifying certificate(s)  UserBridge.der BridgeNavy.der with flags  -d ArmyOnlyDB     -t Navy.der - PASSED
chains.sh: Creating DB NavyOnlyDB
certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd
chains.sh: #9860: Bridge: Creating DB NavyOnlyDB  - PASSED
chains.sh: Importing certificate Navy.der to NavyOnlyDB database
certutil -A -n Navy  -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der
chains.sh: #9861: Bridge: Importing certificate Navy.der to NavyOnlyDB database  - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=User EE,O=User,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #9862: Bridge: Verifying certificate(s)  UserBridge.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. bridge@army [Certificate Authority]:
Email Address(es): bridge@army
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #9863: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB    
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der Army.der 
(pkix_CacheCert_Add: PKIX_PL_HashTable_Add for Certs skipped: entry existed
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user.
    CN=Army ROOT CA,O=Army,C=US
Returned value is 1, expected result is fail
chains.sh: #9864: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     -t Army.der
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der Army.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193538 (0x432f9bc2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 00:35:39 2012
            Not After : Tue Nov 28 00:35:39 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cb:e9:5c:bf:34:37:4a:78:ee:c2:b6:ab:c5:60:e2:2b:
                    27:cd:01:95:4a:9f:48:b4:ff:a3:02:76:0c:b1:74:fb:
                    5d:46:a3:98:fa:ee:35:45:3f:38:35:b2:8c:34:36:d1:
                    0c:cc:72:df:71:9d:fd:85:a0:3d:28:73:20:01:69:fa:
                    e4:e1:ec:fd:34:44:b2:39:05:3c:e3:29:be:c9:ba:48:
                    4c:dd:fd:8a:ec:b1:ac:5e:3d:ac:c9:79:9d:92:e6:95:
                    af:6b:38:68:b4:b1:3b:ac:bf:e0:64:d1:82:34:79:29:
                    69:fb:83:b7:86:8b:37:c0:a2:bf:42:25:7a:ce:85:21
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        71:54:a3:72:3c:6e:d9:64:0d:fe:2f:26:c9:e5:8e:0c:
        e4:2d:37:65:56:c2:5d:bc:fa:6d:ad:df:99:e0:f1:b4:
        35:e9:f2:5d:e5:0e:53:70:d4:e8:4c:16:ba:1d:79:ec:
        f9:79:2b:3a:16:e5:bf:2f:c7:24:e5:01:85:5c:93:b5:
        26:82:3e:31:f9:01:63:55:0f:39:2f:2e:6d:b1:93:9d:
        57:d4:82:bf:2c:34:69:52:4e:c5:8d:b1:cf:5e:0d:bf:
        46:80:ae:f1:79:55:a6:a1:5b:90:cf:6e:f5:a3:d8:c3:
        e4:56:51:86:27:e4:60:8c:ea:1b:57:65:e8:5c:91:74
    Fingerprint (MD5):
        F7:DC:EA:E5:26:17:6D:A3:38:16:A1:CD:90:17:66:B1
    Fingerprint (SHA1):
        37:4E:CC:F6:5D:04:35:49:18:36:AA:BC:EE:DC:B0:FA:3C:3E:E9:B4


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9865: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der Army.der with flags  -d NavyOnlyDB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     -t Army.der
vfychain -d NavyOnlyDB -pp -vv      UserBridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193538 (0x432f9bc2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 00:35:39 2012
            Not After : Tue Nov 28 00:35:39 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cb:e9:5c:bf:34:37:4a:78:ee:c2:b6:ab:c5:60:e2:2b:
                    27:cd:01:95:4a:9f:48:b4:ff:a3:02:76:0c:b1:74:fb:
                    5d:46:a3:98:fa:ee:35:45:3f:38:35:b2:8c:34:36:d1:
                    0c:cc:72:df:71:9d:fd:85:a0:3d:28:73:20:01:69:fa:
                    e4:e1:ec:fd:34:44:b2:39:05:3c:e3:29:be:c9:ba:48:
                    4c:dd:fd:8a:ec:b1:ac:5e:3d:ac:c9:79:9d:92:e6:95:
                    af:6b:38:68:b4:b1:3b:ac:bf:e0:64:d1:82:34:79:29:
                    69:fb:83:b7:86:8b:37:c0:a2:bf:42:25:7a:ce:85:21
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        71:54:a3:72:3c:6e:d9:64:0d:fe:2f:26:c9:e5:8e:0c:
        e4:2d:37:65:56:c2:5d:bc:fa:6d:ad:df:99:e0:f1:b4:
        35:e9:f2:5d:e5:0e:53:70:d4:e8:4c:16:ba:1d:79:ec:
        f9:79:2b:3a:16:e5:bf:2f:c7:24:e5:01:85:5c:93:b5:
        26:82:3e:31:f9:01:63:55:0f:39:2f:2e:6d:b1:93:9d:
        57:d4:82:bf:2c:34:69:52:4e:c5:8d:b1:cf:5e:0d:bf:
        46:80:ae:f1:79:55:a6:a1:5b:90:cf:6e:f5:a3:d8:c3:
        e4:56:51:86:27:e4:60:8c:ea:1b:57:65:e8:5c:91:74
    Fingerprint (MD5):
        F7:DC:EA:E5:26:17:6D:A3:38:16:A1:CD:90:17:66:B1
    Fingerprint (SHA1):
        37:4E:CC:F6:5D:04:35:49:18:36:AA:BC:EE:DC:B0:FA:3C:3E:E9:B4


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #9866: Bridge: Verifying certificate(s)  UserBridge.der BridgeArmy.der with flags  -d NavyOnlyDB     -t Army.der - PASSED
chains.sh: Creating DB Root1DB
certutil -N -d Root1DB -f Root1DB/dbpasswd
chains.sh: #9867: MegaBridge_3_2: Creating DB Root1DB  - PASSED
chains.sh: Creating Root CA Root1
certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1  -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193543 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9868: MegaBridge_3_2: Creating Root CA Root1  - PASSED
chains.sh: Exporting Root CA Root1.der
certutil -L -d Root1DB -r -n Root1 -o Root1.der
chains.sh: #9869: MegaBridge_3_2: Exporting Root CA Root1.der  - PASSED
chains.sh: Creating DB Root2DB
certutil -N -d Root2DB -f Root2DB/dbpasswd
chains.sh: #9870: MegaBridge_3_2: Creating DB Root2DB  - PASSED
chains.sh: Creating Root CA Root2
certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2  -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193544 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9871: MegaBridge_3_2: Creating Root CA Root2  - PASSED
chains.sh: Exporting Root CA Root2.der
certutil -L -d Root2DB -r -n Root2 -o Root2.der
chains.sh: #9872: MegaBridge_3_2: Exporting Root CA Root2.der  - PASSED
chains.sh: Creating DB Root3DB
certutil -N -d Root3DB -f Root3DB/dbpasswd
chains.sh: #9873: MegaBridge_3_2: Creating DB Root3DB  - PASSED
chains.sh: Creating Root CA Root3
certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3  -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193545 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9874: MegaBridge_3_2: Creating Root CA Root3  - PASSED
chains.sh: Exporting Root CA Root3.der
certutil -L -d Root3DB -r -n Root3 -o Root3.der
chains.sh: #9875: MegaBridge_3_2: Exporting Root CA Root3.der  - PASSED
chains.sh: Creating DB Root4DB
certutil -N -d Root4DB -f Root4DB/dbpasswd
chains.sh: #9876: MegaBridge_3_2: Creating DB Root4DB  - PASSED
chains.sh: Creating Root CA Root4
certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4  -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193546 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9877: MegaBridge_3_2: Creating Root CA Root4  - PASSED
chains.sh: Exporting Root CA Root4.der
certutil -L -d Root4DB -r -n Root4 -o Root4.der
chains.sh: #9878: MegaBridge_3_2: Exporting Root CA Root4.der  - PASSED
chains.sh: Creating DB Root5DB
certutil -N -d Root5DB -f Root5DB/dbpasswd
chains.sh: #9879: MegaBridge_3_2: Creating DB Root5DB  - PASSED
chains.sh: Creating Root CA Root5
certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5  -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193547 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9880: MegaBridge_3_2: Creating Root CA Root5  - PASSED
chains.sh: Exporting Root CA Root5.der
certutil -L -d Root5DB -r -n Root5 -o Root5.der
chains.sh: #9881: MegaBridge_3_2: Exporting Root CA Root5.der  - PASSED
chains.sh: Creating DB Root6DB
certutil -N -d Root6DB -f Root6DB/dbpasswd
chains.sh: #9882: MegaBridge_3_2: Creating DB Root6DB  - PASSED
chains.sh: Creating Root CA Root6
certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6  -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193548 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9883: MegaBridge_3_2: Creating Root CA Root6  - PASSED
chains.sh: Exporting Root CA Root6.der
certutil -L -d Root6DB -r -n Root6 -o Root6.der
chains.sh: #9884: MegaBridge_3_2: Exporting Root CA Root6.der  - PASSED
chains.sh: Creating DB Root7DB
certutil -N -d Root7DB -f Root7DB/dbpasswd
chains.sh: #9885: MegaBridge_3_2: Creating DB Root7DB  - PASSED
chains.sh: Creating Root CA Root7
certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7  -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193549 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9886: MegaBridge_3_2: Creating Root CA Root7  - PASSED
chains.sh: Exporting Root CA Root7.der
certutil -L -d Root7DB -r -n Root7 -o Root7.der
chains.sh: #9887: MegaBridge_3_2: Exporting Root CA Root7.der  - PASSED
chains.sh: Creating DB Root8DB
certutil -N -d Root8DB -f Root8DB/dbpasswd
chains.sh: #9888: MegaBridge_3_2: Creating DB Root8DB  - PASSED
chains.sh: Creating Root CA Root8
certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8  -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193550 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9889: MegaBridge_3_2: Creating Root CA Root8  - PASSED
chains.sh: Exporting Root CA Root8.der
certutil -L -d Root8DB -r -n Root8 -o Root8.der
chains.sh: #9890: MegaBridge_3_2: Exporting Root CA Root8.der  - PASSED
chains.sh: Creating DB Root9DB
certutil -N -d Root9DB -f Root9DB/dbpasswd
chains.sh: #9891: MegaBridge_3_2: Creating DB Root9DB  - PASSED
chains.sh: Creating Root CA Root9
certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9  -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193551 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9892: MegaBridge_3_2: Creating Root CA Root9  - PASSED
chains.sh: Exporting Root CA Root9.der
certutil -L -d Root9DB -r -n Root9 -o Root9.der
chains.sh: #9893: MegaBridge_3_2: Exporting Root CA Root9.der  - PASSED
chains.sh: Creating DB Bridge11DB
certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd
chains.sh: #9894: MegaBridge_3_2: Creating DB Bridge11DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge11Req.der
certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US"  -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o Bridge11Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9895: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der  - PASSED
chains.sh: Creating certficate Bridge11Root1.der signed by Root1
certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1127193552 -7 Bridge11@Root1  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9896: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1  - PASSED
chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der
chains.sh: #9897: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root2.der signed by Root2
certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1127193553 -7 Bridge11@Root2  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9898: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2  - PASSED
chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der
chains.sh: #9899: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database  - PASSED
chains.sh: Creating certficate Bridge11Root3.der signed by Root3
certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1127193554 -7 Bridge11@Root3  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9900: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3  - PASSED
chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database
certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der
chains.sh: #9901: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge11DB database
cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7
chains.sh: #9902: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database  - PASSED
chains.sh: Creating DB Bridge12DB
certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd
chains.sh: #9903: MegaBridge_3_2: Creating DB Bridge12DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge12Req.der
certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US"  -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o Bridge12Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9904: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der  - PASSED
chains.sh: Creating certficate Bridge12Root4.der signed by Root4
certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1127193555 -7 Bridge12@Root4  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9905: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4  - PASSED
chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der
chains.sh: #9906: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root5.der signed by Root5
certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1127193556 -7 Bridge12@Root5  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9907: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5  - PASSED
chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der
chains.sh: #9908: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database  - PASSED
chains.sh: Creating certficate Bridge12Root6.der signed by Root6
certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1127193557 -7 Bridge12@Root6  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9909: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6  - PASSED
chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database
certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der
chains.sh: #9910: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge12DB database
cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7
chains.sh: #9911: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database  - PASSED
chains.sh: Creating DB Bridge13DB
certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd
chains.sh: #9912: MegaBridge_3_2: Creating DB Bridge13DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge13Req.der
certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US"  -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o Bridge13Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9913: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der  - PASSED
chains.sh: Creating certficate Bridge13Root7.der signed by Root7
certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1127193558 -7 Bridge13@Root7  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9914: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7  - PASSED
chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der
chains.sh: #9915: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root8.der signed by Root8
certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1127193559 -7 Bridge13@Root8  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9916: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8  - PASSED
chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der
chains.sh: #9917: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database  - PASSED
chains.sh: Creating certficate Bridge13Root9.der signed by Root9
certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1127193560 -7 Bridge13@Root9  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9918: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9  - PASSED
chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database
certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der
chains.sh: #9919: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge13DB database
cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7
chains.sh: #9920: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database  - PASSED
chains.sh: Creating DB Bridge21DB
certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd
chains.sh: #9921: MegaBridge_3_2: Creating DB Bridge21DB  - PASSED
chains.sh: Creating Bridge certifiate request Bridge21Req.der
certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US"  -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o Bridge21Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9922: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der  - PASSED
chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11
certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1127193561 -7 Bridge21@Bridge11  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9923: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11  - PASSED
chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der
chains.sh: #9924: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12
certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1127193562 -7 Bridge21@Bridge12  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9925: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12  - PASSED
chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der
chains.sh: #9926: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database  - PASSED
chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13
certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1127193563 -7 Bridge21@Bridge13  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9927: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13  - PASSED
chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database
certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der
chains.sh: #9928: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database  - PASSED
chains.sh: Generating PKCS7 package from Bridge21DB database
cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7
chains.sh: #9929: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #9930: MegaBridge_3_2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9931: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21
certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1127193564   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9932: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21  - PASSED
chains.sh: Importing certificate CA1Bridge21.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der
chains.sh: #9933: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #9934: MegaBridge_3_2: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9935: MegaBridge_3_2: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127193565   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #9936: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #9937: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags  -d EE1DB     -t Root1.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der  -t Root1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193543 (0x432f9bc7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root1 ROOT CA,O=Root1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:35:55 2012
            Not After : Tue Nov 28 00:35:55 2062
        Subject: "CN=Root1 ROOT CA,O=Root1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ee:c6:f0:d0:1f:ad:f2:86:ed:75:01:0f:7b:cc:6b:88:
                    3d:e6:69:3f:3a:c7:bf:7b:c4:bb:dd:e3:36:71:2e:6d:
                    0d:44:5c:8a:9e:83:51:df:1f:a9:b4:f0:b9:b1:7b:83:
                    c2:a8:e9:be:ae:2b:be:e0:e9:ae:91:23:ad:3a:20:c9:
                    82:aa:ed:bc:a1:9d:24:29:bb:27:1e:40:3a:13:c3:ba:
                    77:fa:e4:78:23:98:ed:34:74:9a:e4:4d:93:4a:74:e9:
                    d6:45:c7:b0:1a:4b:60:d4:b6:be:39:25:80:a2:e0:3a:
                    56:ce:e1:bf:f1:54:b7:e5:55:3a:e0:16:65:46:e9:c3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        24:68:f2:3d:03:56:74:a8:3d:a1:91:4f:ff:4e:1b:36:
        81:8a:14:ce:0b:05:d0:67:6e:6e:19:0e:00:94:8a:59:
        3b:77:47:f5:a6:c4:68:ce:d8:92:30:cd:47:b2:bf:51:
        88:ac:34:fa:6b:47:a0:bf:56:03:dd:4f:db:52:3f:8d:
        3d:75:8c:78:0a:f3:c8:c0:a2:9d:ff:58:63:7e:ad:22:
        53:20:6d:49:0a:4b:9e:e6:0e:51:7f:bd:44:b0:3e:1f:
        cd:fb:bb:92:cd:f1:17:79:c7:83:cf:fe:5d:57:0b:19:
        c1:ed:fb:2b:8b:93:25:29:4c:dc:10:1d:92:8b:25:8b
    Fingerprint (MD5):
        26:F3:81:37:A1:A0:6E:3E:37:EC:95:29:DB:F1:3D:BB
    Fingerprint (SHA1):
        87:B1:D6:A1:26:DC:8A:CA:AD:E2:04:84:5C:91:CE:14:40:0E:61:0B


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #9938: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags  -d EE1DB     -t Root1.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags  -d EE1DB     -t Root2.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der  -t Root2.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193544 (0x432f9bc8)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root2 ROOT CA,O=Root2,C=US"
        Validity:
            Not Before: Wed Nov 28 00:35:57 2012
            Not After : Tue Nov 28 00:35:57 2062
        Subject: "CN=Root2 ROOT CA,O=Root2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f7:83:be:d9:6d:d1:27:24:c7:1a:08:e8:42:16:d4:29:
                    70:f3:80:5e:70:e7:e5:87:24:f9:31:3b:56:48:5b:39:
                    81:6e:99:fe:91:47:f5:a4:db:79:03:5d:56:f9:f8:b0:
                    65:91:38:d7:16:35:41:78:0d:88:92:27:81:50:70:8d:
                    1e:2b:b0:88:54:d4:7c:4e:a5:4e:8c:9d:53:4a:2e:70:
                    ab:8e:c4:82:ed:20:16:c0:03:8f:a3:eb:ab:2e:8f:f3:
                    2a:3b:cd:0d:30:6f:a4:9c:ca:84:5a:a1:a2:80:fd:ae:
                    48:d0:e2:b7:bd:15:69:c8:2f:9c:e6:45:25:0c:23:e9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9a:1d:b8:aa:7f:c5:74:0a:e2:6a:92:f6:83:a5:5b:2d:
        13:1e:b7:68:fc:e1:b6:56:9c:82:1d:45:c0:52:4d:8c:
        61:1a:4f:da:15:db:13:26:31:28:37:ec:64:6f:08:5b:
        cb:a1:da:97:b6:83:1c:04:cb:3f:c9:1f:d2:63:a7:08:
        83:6f:5a:e9:69:2e:d6:98:44:f7:b1:7c:11:cd:71:73:
        6c:b6:12:34:b0:ac:22:93:17:8a:0e:45:57:fd:bd:19:
        6f:c7:8b:89:c1:ac:c5:66:50:cb:c4:13:63:34:6f:87:
        1d:2f:67:3d:03:e6:31:3e:a7:72:a0:17:ee:aa:c0:e4
    Fingerprint (MD5):
        4C:B3:20:CB:B9:1B:A9:67:B9:8F:C9:BD:92:C1:7C:81
    Fingerprint (SHA1):
        33:9F:D2:7C:52:AF:C2:51:EB:F3:52:BE:8E:A5:DB:20:15:CE:8B:86


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #9939: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags  -d EE1DB     -t Root2.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags  -d EE1DB     -t Root3.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der  -t Root3.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193545 (0x432f9bc9)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root3 ROOT CA,O=Root3,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:00 2012
            Not After : Tue Nov 28 00:36:00 2062
        Subject: "CN=Root3 ROOT CA,O=Root3,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bb:03:99:de:65:d9:14:25:0e:f2:7c:10:57:ef:19:00:
                    4e:e1:04:9c:6d:fa:b5:95:9d:0e:f0:c4:24:66:2e:23:
                    a5:9a:72:23:79:5b:88:52:7f:73:c9:bd:7e:7e:9f:32:
                    5e:f6:16:a2:c9:e1:7e:17:5f:d0:97:43:86:c1:48:e5:
                    d8:ac:39:d8:47:0d:0a:f2:8f:ec:14:e9:d3:ae:5b:17:
                    02:a0:b2:b8:12:e1:f9:b9:b6:eb:71:84:56:7c:a6:5b:
                    02:45:94:1b:e5:08:d2:eb:41:85:9c:e9:70:c5:17:43:
                    1f:68:35:0b:df:e6:ff:6c:77:61:2b:22:38:78:91:77
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        a9:9f:79:49:23:fd:d3:da:c4:dd:d6:25:35:90:26:5b:
        be:20:31:57:7e:d0:95:70:c4:b6:2d:2c:8d:93:aa:d0:
        0e:aa:67:83:a9:9f:c4:6d:8e:dd:1d:79:c2:d9:1e:ba:
        45:1b:41:07:fe:47:92:09:44:3f:77:73:54:5e:60:7d:
        bd:2f:56:30:7c:f8:36:4c:e8:c2:94:df:a6:76:6c:de:
        06:2c:bd:84:00:9b:8f:c3:2d:c9:52:35:fa:0d:cb:db:
        53:20:c2:e2:01:75:7f:60:fd:e3:77:85:f1:20:cc:68:
        84:0d:6f:1f:f6:c3:95:c1:2f:28:c9:23:98:a2:40:a1
    Fingerprint (MD5):
        95:58:8B:61:44:C3:8A:2F:D3:94:E9:DE:9D:1C:ED:23
    Fingerprint (SHA1):
        50:64:94:17:62:24:29:32:56:E0:1B:9F:95:42:42:B2:14:A7:90:FE


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US"
Returned value is 0, expected result is pass
chains.sh: #9940: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags  -d EE1DB     -t Root3.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags  -d EE1DB     -t Root4.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der  -t Root4.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193546 (0x432f9bca)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root4 ROOT CA,O=Root4,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:02 2012
            Not After : Tue Nov 28 00:36:02 2062
        Subject: "CN=Root4 ROOT CA,O=Root4,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a0:05:73:56:57:eb:67:22:27:84:e1:b8:a4:25:8c:78:
                    96:73:3e:7a:25:e8:8d:f1:f4:53:42:57:bc:f2:65:82:
                    74:16:41:e8:9f:a7:3e:79:e9:f2:6c:c4:42:6c:a2:29:
                    27:a7:d7:9f:06:7e:c2:d3:de:c4:f4:77:3a:c0:a5:74:
                    89:e4:c4:19:b0:32:65:d7:5e:24:83:26:e1:30:30:74:
                    19:9f:c7:e2:80:03:8c:79:77:7c:b6:f3:fc:ae:4e:0b:
                    82:83:1a:54:56:82:f0:94:b8:88:80:2f:3b:ef:51:d3:
                    bd:04:98:57:64:ee:87:dc:61:b0:31:5a:ee:ce:15:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        35:81:52:bc:3e:7d:56:8c:d9:a2:06:d0:e1:82:b6:6f:
        34:8e:90:a2:cd:e9:ed:2b:c3:3f:56:e5:ec:3b:f1:5f:
        49:2d:36:16:90:d5:73:51:bc:de:dd:43:ac:a4:6b:72:
        2b:a0:be:40:e0:1e:fc:9f:72:0c:8a:bc:02:0a:7e:8e:
        f8:8d:33:7f:91:76:0e:3c:92:f2:00:f1:6d:3c:bb:33:
        0b:7d:d0:7c:87:0d:f1:84:cb:43:64:66:a9:a5:84:66:
        f0:05:6e:7e:d6:11:71:ba:e3:c7:68:28:66:84:87:c6:
        c6:7e:4c:1e:15:1b:98:25:85:bd:a8:7d:92:80:f9:83
    Fingerprint (MD5):
        F8:EE:AA:46:72:18:E5:83:73:21:C2:CB:31:B2:07:89
    Fingerprint (SHA1):
        C9:97:1F:EB:B9:22:86:0F:27:5A:8A:A7:B8:39:02:88:41:03:19:3D


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #9941: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags  -d EE1DB     -t Root4.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags  -d EE1DB     -t Root5.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der  -t Root5.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193547 (0x432f9bcb)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root5 ROOT CA,O=Root5,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:05 2012
            Not After : Tue Nov 28 00:36:05 2062
        Subject: "CN=Root5 ROOT CA,O=Root5,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:4f:9e:3f:0e:99:24:51:89:56:90:b7:e4:97:e0:50:
                    8b:d9:91:2f:50:a4:90:53:f4:67:d9:da:dd:5f:09:07:
                    74:3c:79:ef:18:fc:40:45:97:89:aa:d3:2b:3a:95:23:
                    01:a8:bd:ea:ce:01:c2:6b:bc:3b:2a:b4:59:14:88:8c:
                    cf:06:e7:bd:f9:01:58:de:a7:a1:f0:1e:1a:61:b9:ec:
                    8e:ca:6d:20:87:69:d3:fb:df:eb:c3:61:14:87:d8:10:
                    52:27:26:c3:a6:9e:64:77:8b:a6:bd:c9:33:af:09:fb:
                    1b:ae:be:12:90:cd:ca:55:3c:9b:06:e8:a4:82:70:c3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b2:fb:d4:b6:83:0d:c2:ca:d1:a1:1f:2e:91:e8:a8:aa:
        f7:3a:db:04:2a:54:3f:24:72:28:e3:ee:0e:0d:74:0f:
        1f:22:86:30:60:8a:ce:c3:36:2c:97:c1:b8:69:d3:3b:
        6d:2a:f2:10:97:4b:55:a8:30:af:52:f5:c9:c2:84:bf:
        c5:66:1b:dd:31:87:10:3b:72:94:14:1f:2c:b6:02:a5:
        ad:72:49:51:ae:bf:05:ce:bd:26:2d:a3:26:90:23:e3:
        78:b4:dd:f7:94:57:17:3c:3f:4a:1d:7c:67:0c:35:ca:
        fd:68:b9:ae:6a:b4:70:90:78:18:6f:09:c2:47:35:48
    Fingerprint (MD5):
        99:49:14:98:E1:62:7A:86:AC:0A:4C:3E:A7:CA:57:88
    Fingerprint (SHA1):
        0C:FB:44:7E:4A:6E:DC:12:37:71:D8:8C:0D:01:38:8D:4B:96:C8:FF


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #9942: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags  -d EE1DB     -t Root5.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags  -d EE1DB     -t Root6.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der  -t Root6.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193548 (0x432f9bcc)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root6 ROOT CA,O=Root6,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:07 2012
            Not After : Tue Nov 28 00:36:07 2062
        Subject: "CN=Root6 ROOT CA,O=Root6,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    d0:6d:84:34:42:44:08:a0:44:04:8d:e3:7b:a0:95:11:
                    11:3f:84:1e:a1:7f:57:60:bf:22:62:ad:50:27:a8:a3:
                    a6:33:d0:a3:0c:24:c1:b8:43:38:9a:66:dc:43:38:5d:
                    ed:2d:e5:8f:b6:d1:31:d0:6f:39:1e:aa:01:b5:48:84:
                    f8:6a:8d:c5:1d:57:9f:43:a0:25:37:e5:e1:12:ff:7e:
                    70:35:0c:85:11:37:82:5d:c7:8c:92:13:d4:4b:a9:e9:
                    10:a5:31:58:d7:be:4f:d6:68:dc:cf:41:4e:50:21:60:
                    a2:4c:70:90:18:56:06:b9:cb:28:90:09:c5:3f:ea:c5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        70:f1:a2:0d:a3:60:c1:a5:a2:f3:ee:e2:7f:c5:0b:0f:
        b6:1c:db:bf:d8:17:70:b1:cf:f6:20:69:31:40:10:0e:
        cf:8c:ab:47:c4:4f:2f:d7:fa:6c:65:02:69:06:0e:98:
        65:fb:2b:96:de:5d:5a:35:ae:a9:89:e1:18:d5:3c:4c:
        42:94:20:62:b9:e3:d3:30:db:23:ad:39:ce:12:45:ad:
        55:fd:54:16:10:b3:6b:42:53:22:74:f0:55:1c:8b:78:
        eb:f3:0a:61:12:bb:41:63:42:ae:ab:f1:7a:95:9c:cc:
        e7:f2:95:d0:9e:c5:bb:f1:b7:e7:16:98:77:f0:e9:87
    Fingerprint (MD5):
        8C:67:38:C2:E9:CD:9E:62:66:2F:5C:0E:91:6B:22:F1
    Fingerprint (SHA1):
        1A:81:09:10:1D:E6:90:7D:4E:5F:41:F7:90:D0:8D:4F:0A:3C:15:55


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US"
Returned value is 0, expected result is pass
chains.sh: #9943: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags  -d EE1DB     -t Root6.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags  -d EE1DB     -t Root7.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der  -t Root7.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193549 (0x432f9bcd)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root7 ROOT CA,O=Root7,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:09 2012
            Not After : Tue Nov 28 00:36:09 2062
        Subject: "CN=Root7 ROOT CA,O=Root7,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e2:d3:8f:63:09:67:e0:12:45:b1:b1:b2:e7:22:ca:4a:
                    ce:81:fc:b9:70:06:96:ca:da:17:52:61:cd:56:b7:c1:
                    67:db:52:ec:47:c0:ad:c8:b7:52:f4:c8:0f:ad:6b:3c:
                    15:e3:b2:32:1c:d1:bf:73:df:ac:26:0a:b3:ae:7b:b0:
                    0f:ea:ee:6d:cb:ef:98:55:4f:46:f5:79:c9:78:f7:6c:
                    a5:77:b0:2e:e5:0e:dc:50:87:d0:d0:35:28:59:8b:ef:
                    d8:4e:38:c0:35:fc:2c:26:8f:2f:a5:69:32:8f:25:9a:
                    59:58:a6:06:70:6a:a8:58:3b:f6:ce:6e:c1:33:61:19
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        5a:9c:96:9e:01:f7:7e:49:83:cc:d0:ac:45:f4:ad:d4:
        f2:cf:af:f0:42:b2:d0:94:e5:bf:54:5e:cc:2b:92:a5:
        59:6e:90:3f:ab:f6:f0:20:90:b9:36:bd:ff:78:10:06:
        9a:ed:76:f7:e4:21:64:18:7f:2e:93:71:f5:9f:b6:44:
        eb:17:45:da:2c:65:28:0b:5f:56:de:bf:a3:9f:a3:96:
        60:b1:cd:06:49:88:3b:5d:5d:86:26:41:75:93:34:7e:
        bb:9b:dc:c9:80:2f:70:62:58:08:87:e9:23:ef:b0:cf:
        56:08:21:6a:cd:bc:38:ab:9a:da:26:c2:1d:42:a3:40
    Fingerprint (MD5):
        2A:9B:90:40:20:60:05:A8:14:AA:3A:72:3D:A9:E1:8C
    Fingerprint (SHA1):
        8B:73:91:18:5E:61:8F:22:12:90:9C:FF:80:78:4B:6D:48:70:CB:AF


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #9944: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags  -d EE1DB     -t Root7.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags  -d EE1DB     -t Root8.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der  -t Root8.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193550 (0x432f9bce)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root8 ROOT CA,O=Root8,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:11 2012
            Not After : Tue Nov 28 00:36:11 2062
        Subject: "CN=Root8 ROOT CA,O=Root8,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:d6:c9:03:fc:a3:09:d6:1b:a7:40:6c:be:42:e8:2d:
                    83:75:e8:9f:a9:82:83:01:1f:64:eb:7c:1a:4c:e8:da:
                    db:b3:89:f2:93:7b:13:94:ce:5a:c2:1e:a9:dc:70:ce:
                    54:5a:ab:6e:b9:58:fa:a9:17:0b:c3:79:7a:ef:b6:2f:
                    48:cf:7b:cb:3a:55:25:70:0a:fd:c8:49:e1:c7:cc:c3:
                    b8:1d:aa:ea:33:ab:42:64:2d:b4:7d:5a:b2:70:14:73:
                    f3:ed:e8:2b:3c:04:92:ee:57:22:a7:a8:c8:7c:17:22:
                    fd:76:52:75:96:e4:2a:64:d7:37:a7:d6:ae:66:0a:dd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        86:1f:fd:ea:fd:db:6b:50:11:48:36:fb:2a:6d:04:b1:
        81:3b:dc:29:a4:ee:50:a7:ed:53:16:2e:23:a3:8e:95:
        a1:2b:d4:83:46:69:13:53:50:56:86:6a:ce:a3:23:62:
        7b:7d:21:92:27:ed:80:15:e6:44:38:a9:6d:e3:3a:de:
        5a:3a:c8:b2:60:19:43:7a:73:83:07:00:14:1a:fe:17:
        b7:f1:4b:4c:6e:4a:ec:82:9a:ce:d0:fb:f1:26:24:f0:
        dc:dd:f3:05:94:c0:8b:92:89:db:2c:2b:39:90:87:d2:
        92:4b:9d:72:03:26:e9:b5:c9:39:84:81:f4:dc:57:17
    Fingerprint (MD5):
        08:77:DB:77:A1:FC:CA:6D:FF:42:E8:C9:DA:5B:C2:21
    Fingerprint (SHA1):
        40:16:71:FD:A9:F9:5A:17:BD:33:99:8A:9E:04:0C:1F:4E:77:65:D6


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #9945: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags  -d EE1DB     -t Root8.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags  -d EE1DB     -t Root9.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der  -t Root9.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193551 (0x432f9bcf)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root9 ROOT CA,O=Root9,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:14 2012
            Not After : Tue Nov 28 00:36:14 2062
        Subject: "CN=Root9 ROOT CA,O=Root9,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b1:c7:5c:0a:58:33:ce:8e:b0:7d:22:23:02:c2:4b:c4:
                    76:b1:f9:51:5b:55:7b:68:1b:68:21:9b:3e:76:38:08:
                    b8:7f:0d:05:27:f0:c8:e5:20:01:30:3f:c7:6f:29:d7:
                    b6:ef:f0:a9:61:cf:d1:95:b3:ef:4c:77:26:57:b5:dc:
                    2c:18:ea:e8:6c:70:7a:a3:4a:47:6c:11:4a:a1:d4:dd:
                    69:ee:2e:94:db:bb:bc:96:10:2b:12:c7:fd:cd:cb:a0:
                    63:68:e2:c8:1a:6d:39:d9:b1:61:03:85:ef:74:f7:4d:
                    60:e1:b5:79:58:2b:b1:e0:d5:e9:de:c2:7c:af:e5:e5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:50:7c:36:97:9c:76:ce:79:67:1b:b6:0f:e4:a0:96:
        17:88:f3:46:92:5b:51:22:d9:e7:ca:82:c4:11:85:34:
        a9:c3:30:9c:2d:02:3b:5e:46:49:b0:69:27:87:29:75:
        c0:60:fb:c2:37:47:61:6d:8c:bb:ac:b2:fe:c1:43:92:
        ee:6c:8a:a3:05:e4:87:87:c3:f1:22:18:91:38:43:e4:
        66:f5:ef:df:85:2b:c9:b3:d1:40:1b:92:5e:e2:66:0a:
        d1:72:c1:83:13:0b:99:2f:4f:98:97:e6:88:73:1d:87:
        b0:40:87:21:cc:71:b1:e8:f3:34:7b:32:12:2c:09:b8
    Fingerprint (MD5):
        C7:32:03:50:3C:85:E3:F1:3B:15:AC:32:DE:0B:11:30
    Fingerprint (SHA1):
        F0:CE:49:8C:5A:3B:CC:90:02:6F:A0:5D:D3:67:83:97:2A:1F:6B:BE


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US"
Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US"
Returned value is 0, expected result is pass
chains.sh: #9946: MegaBridge_3_2: Verifying certificate(s)  EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags  -d EE1DB     -t Root9.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #9947: Extension: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193566 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9948: Extension: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #9949: Extension: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #9950: Extension: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9951: Extension: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127193567   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9952: Extension: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #9953: Extension: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #9954: Extension: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9955: Extension: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127193568   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9956: Extension: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #9957: Extension: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #9958: Extension: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9959: Extension: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1127193569   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9960: Extension: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #9961: Extension: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #9962: Extension: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193566 (0x432f9bde)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:35 2012
            Not After : Tue Nov 28 00:36:35 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:3b:f2:f9:59:db:de:02:91:c5:95:6f:1c:0a:eb:df:
                    5c:dd:18:90:20:7e:99:a2:3c:f4:a7:34:3a:f3:f6:bc:
                    6c:fb:09:a5:61:ad:63:9e:6f:a4:99:78:e5:f5:1a:14:
                    04:0f:47:69:5d:e3:9c:ff:45:6a:e0:6e:f6:bf:c8:ff:
                    74:4d:b9:38:97:9e:4d:4f:1e:28:38:bf:a9:c1:90:9a:
                    b2:0d:bc:85:53:04:63:cf:53:15:09:78:44:64:60:81:
                    f2:8a:91:f6:88:1e:44:d7:c6:35:1d:2f:61:5e:3c:07:
                    59:ea:2b:32:e5:fa:d4:bb:aa:e0:b8:3a:66:08:c7:bf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        51:7e:85:2f:03:47:15:fb:36:4a:03:95:a2:2d:dd:d6:
        c8:f2:6c:6d:bf:bc:17:92:4a:83:58:e0:96:bf:88:3a:
        30:02:71:1e:8e:8d:cd:fd:fd:d3:ff:db:70:b8:aa:6c:
        88:ef:33:ea:86:0f:a4:18:12:80:ff:0a:91:cd:b8:4e:
        44:d9:d5:65:81:3e:c1:82:18:1c:8f:f8:1d:bc:1f:dc:
        32:18:36:f0:8d:29:5f:17:e2:fa:5e:3b:c4:84:59:5f:
        c1:8a:5a:e4:3e:69:dd:41:43:26:f3:43:44:8d:91:b7:
        30:1d:cf:2c:35:55:a1:8e:bb:ef:38:a4:c1:7a:7e:85
    Fingerprint (MD5):
        CA:B6:14:B1:78:C1:D9:58:6A:C4:76:8B:82:49:9F:22
    Fingerprint (SHA1):
        D4:91:86:10:20:E2:14:D4:FC:74:52:94:99:5D:40:16:DE:54:DD:41


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9963: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9964: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193567 (0x432f9bdf)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:37 2012
            Not After : Tue Nov 28 00:36:37 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f3:7e:84:17:26:14:f8:42:80:5f:4d:68:bf:f5:fc:a5:
                    ee:11:b5:74:af:41:90:24:9b:00:7f:02:c5:d6:1a:55:
                    26:1d:8c:09:fd:b5:5c:fe:f8:11:41:88:eb:c2:ce:d6:
                    be:e1:20:77:10:3d:3d:15:56:a5:f6:8c:77:92:81:2a:
                    d1:ef:f4:09:8f:63:f3:d3:e5:1e:29:6a:15:8d:d7:e7:
                    d9:72:42:11:47:04:21:56:fb:8c:c8:cf:9a:6a:5b:2b:
                    ff:82:3d:6f:bf:f9:f3:76:cf:d4:e5:0f:a3:09:d8:44:
                    16:ff:d1:09:10:18:88:7b:11:69:cc:96:f1:70:17:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        69:db:db:27:82:9a:2c:76:8f:2a:12:7a:f9:bc:14:f1:
        c5:ce:03:33:c1:a9:26:2c:47:e5:b6:94:8c:da:5a:65:
        e7:3c:76:7f:d5:5e:07:27:49:10:0f:bd:53:b6:eb:9b:
        9d:71:0c:2f:af:5d:c3:1a:c9:60:d8:eb:aa:72:a6:bf:
        43:06:d2:1d:09:84:32:83:50:81:ca:95:17:fa:1b:ec:
        d8:e7:b8:b0:6b:12:06:77:f9:dd:b9:4c:a9:bc:d9:88:
        28:4c:c4:9c:02:30:b3:64:2c:e9:84:eb:e1:31:93:31:
        81:41:38:44:e9:72:78:e0:28:c6:ab:03:92:6d:de:3e
    Fingerprint (MD5):
        8B:25:09:7D:D5:3A:6C:3E:26:70:E0:B5:38:2B:FD:63
    Fingerprint (SHA1):
        7F:AA:23:36:FB:E4:33:FE:F7:FD:CB:73:74:4D:F1:4F:B3:A2:BC:51


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #9965: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9966: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193568 (0x432f9be0)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:39 2012
            Not After : Tue Nov 28 00:36:39 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ef:49:9e:6a:de:3b:c9:dc:80:94:a4:18:8b:c1:a1:27:
                    06:9a:57:4f:2d:1a:3d:7a:30:94:2e:ce:be:0c:53:45:
                    f1:1b:a1:ab:98:ce:59:25:a3:1c:c1:2d:db:67:b5:72:
                    0f:bb:99:c3:b3:0a:2d:a5:ea:70:5f:17:8b:89:f9:26:
                    b7:2e:ab:ec:a0:5d:b8:6b:68:b6:63:ac:69:c1:05:23:
                    28:4e:29:97:bd:7c:ef:01:a4:04:98:2c:77:4a:e8:f7:
                    ae:5b:d1:e8:60:cd:5c:d8:89:f2:4a:58:8c:1e:38:9c:
                    b9:31:e2:e0:5f:ed:c3:e0:12:5c:e7:ac:59:27:d3:df
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        aa:81:32:e2:d8:8e:a0:f2:4d:0a:d0:98:71:55:1d:46:
        e2:ac:3a:48:5d:a4:81:5b:64:29:d8:43:ef:89:4f:52:
        5b:a8:0a:88:f2:8c:83:91:a9:04:de:13:f6:56:13:3f:
        f2:16:17:10:a7:b0:5b:35:f8:b6:6e:8a:ad:fa:d0:0c:
        51:98:82:b4:80:c2:f1:e9:4e:c3:78:47:48:a2:a8:2e:
        ae:31:d5:26:73:22:e9:bd:e7:6c:15:35:d9:17:ad:ca:
        42:b0:dc:69:4c:ca:e9:99:35:ee:c2:1c:b1:ce:29:7c:
        b9:0c:90:a9:08:71:9e:86:d9:68:5f:9a:4b:8e:1b:30
    Fingerprint (MD5):
        84:28:64:8E:1D:66:03:32:CB:4E:75:46:62:65:AD:19
    Fingerprint (SHA1):
        1C:71:C1:F7:BF:99:20:23:B1:B3:00:74:4C:BE:6A:F7:F1:00:21:DE


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #9967: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9968: Extension: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #9969: Extension: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #9970: Extension: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #9971: Extension: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193566 (0x432f9bde)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:35 2012
            Not After : Tue Nov 28 00:36:35 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cc:3b:f2:f9:59:db:de:02:91:c5:95:6f:1c:0a:eb:df:
                    5c:dd:18:90:20:7e:99:a2:3c:f4:a7:34:3a:f3:f6:bc:
                    6c:fb:09:a5:61:ad:63:9e:6f:a4:99:78:e5:f5:1a:14:
                    04:0f:47:69:5d:e3:9c:ff:45:6a:e0:6e:f6:bf:c8:ff:
                    74:4d:b9:38:97:9e:4d:4f:1e:28:38:bf:a9:c1:90:9a:
                    b2:0d:bc:85:53:04:63:cf:53:15:09:78:44:64:60:81:
                    f2:8a:91:f6:88:1e:44:d7:c6:35:1d:2f:61:5e:3c:07:
                    59:ea:2b:32:e5:fa:d4:bb:aa:e0:b8:3a:66:08:c7:bf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        51:7e:85:2f:03:47:15:fb:36:4a:03:95:a2:2d:dd:d6:
        c8:f2:6c:6d:bf:bc:17:92:4a:83:58:e0:96:bf:88:3a:
        30:02:71:1e:8e:8d:cd:fd:fd:d3:ff:db:70:b8:aa:6c:
        88:ef:33:ea:86:0f:a4:18:12:80:ff:0a:91:cd:b8:4e:
        44:d9:d5:65:81:3e:c1:82:18:1c:8f:f8:1d:bc:1f:dc:
        32:18:36:f0:8d:29:5f:17:e2:fa:5e:3b:c4:84:59:5f:
        c1:8a:5a:e4:3e:69:dd:41:43:26:f3:43:44:8d:91:b7:
        30:1d:cf:2c:35:55:a1:8e:bb:ef:38:a4:c1:7a:7e:85
    Fingerprint (MD5):
        CA:B6:14:B1:78:C1:D9:58:6A:C4:76:8B:82:49:9F:22
    Fingerprint (SHA1):
        D4:91:86:10:20:E2:14:D4:FC:74:52:94:99:5D:40:16:DE:54:DD:41

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9972: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9973: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193567 (0x432f9bdf)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:37 2012
            Not After : Tue Nov 28 00:36:37 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f3:7e:84:17:26:14:f8:42:80:5f:4d:68:bf:f5:fc:a5:
                    ee:11:b5:74:af:41:90:24:9b:00:7f:02:c5:d6:1a:55:
                    26:1d:8c:09:fd:b5:5c:fe:f8:11:41:88:eb:c2:ce:d6:
                    be:e1:20:77:10:3d:3d:15:56:a5:f6:8c:77:92:81:2a:
                    d1:ef:f4:09:8f:63:f3:d3:e5:1e:29:6a:15:8d:d7:e7:
                    d9:72:42:11:47:04:21:56:fb:8c:c8:cf:9a:6a:5b:2b:
                    ff:82:3d:6f:bf:f9:f3:76:cf:d4:e5:0f:a3:09:d8:44:
                    16:ff:d1:09:10:18:88:7b:11:69:cc:96:f1:70:17:71
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        69:db:db:27:82:9a:2c:76:8f:2a:12:7a:f9:bc:14:f1:
        c5:ce:03:33:c1:a9:26:2c:47:e5:b6:94:8c:da:5a:65:
        e7:3c:76:7f:d5:5e:07:27:49:10:0f:bd:53:b6:eb:9b:
        9d:71:0c:2f:af:5d:c3:1a:c9:60:d8:eb:aa:72:a6:bf:
        43:06:d2:1d:09:84:32:83:50:81:ca:95:17:fa:1b:ec:
        d8:e7:b8:b0:6b:12:06:77:f9:dd:b9:4c:a9:bc:d9:88:
        28:4c:c4:9c:02:30:b3:64:2c:e9:84:eb:e1:31:93:31:
        81:41:38:44:e9:72:78:e0:28:c6:ab:03:92:6d:de:3e
    Fingerprint (MD5):
        8B:25:09:7D:D5:3A:6C:3E:26:70:E0:B5:38:2B:FD:63
    Fingerprint (SHA1):
        7F:AA:23:36:FB:E4:33:FE:F7:FD:CB:73:74:4D:F1:4F:B3:A2:BC:51

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #9974: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9975: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193568 (0x432f9be0)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:39 2012
            Not After : Tue Nov 28 00:36:39 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ef:49:9e:6a:de:3b:c9:dc:80:94:a4:18:8b:c1:a1:27:
                    06:9a:57:4f:2d:1a:3d:7a:30:94:2e:ce:be:0c:53:45:
                    f1:1b:a1:ab:98:ce:59:25:a3:1c:c1:2d:db:67:b5:72:
                    0f:bb:99:c3:b3:0a:2d:a5:ea:70:5f:17:8b:89:f9:26:
                    b7:2e:ab:ec:a0:5d:b8:6b:68:b6:63:ac:69:c1:05:23:
                    28:4e:29:97:bd:7c:ef:01:a4:04:98:2c:77:4a:e8:f7:
                    ae:5b:d1:e8:60:cd:5c:d8:89:f2:4a:58:8c:1e:38:9c:
                    b9:31:e2:e0:5f:ed:c3:e0:12:5c:e7:ac:59:27:d3:df
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        aa:81:32:e2:d8:8e:a0:f2:4d:0a:d0:98:71:55:1d:46:
        e2:ac:3a:48:5d:a4:81:5b:64:29:d8:43:ef:89:4f:52:
        5b:a8:0a:88:f2:8c:83:91:a9:04:de:13:f6:56:13:3f:
        f2:16:17:10:a7:b0:5b:35:f8:b6:6e:8a:ad:fa:d0:0c:
        51:98:82:b4:80:c2:f1:e9:4e:c3:78:47:48:a2:a8:2e:
        ae:31:d5:26:73:22:e9:bd:e7:6c:15:35:d9:17:ad:ca:
        42:b0:dc:69:4c:ca:e9:99:35:ee:c2:1c:b1:ce:29:7c:
        b9:0c:90:a9:08:71:9e:86:d9:68:5f:9a:4b:8e:1b:30
    Fingerprint (MD5):
        84:28:64:8E:1D:66:03:32:CB:4E:75:46:62:65:AD:19
    Fingerprint (SHA1):
        1C:71:C1:F7:BF:99:20:23:B1:B3:00:74:4C:BE:6A:F7:F1:00:21:DE

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #9976: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9977: Extension: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #9978: Extension2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193570 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #9979: Extension2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #9980: Extension2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #9981: Extension2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9982: Extension2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127193571   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9983: Extension2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #9984: Extension2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #9985: Extension2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #9986: Extension2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127193572   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9987: Extension2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #9988: Extension2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #9989: Extension2: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o User1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9990: Extension2: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1127193573   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9991: Extension2: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
chains.sh: #9992: Extension2: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #9993: Extension2: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o User2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #9994: Extension2: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1127193574   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #9995: Extension2: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
chains.sh: #9996: Extension2: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #9997: Extension2: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193570 (0x432f9be2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:46 2012
            Not After : Tue Nov 28 00:36:46 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:0a:ca:16:a0:7c:c5:0a:f5:95:eb:c5:8a:2d:e6:c7:
                    82:7a:08:4f:4e:53:5d:33:96:0b:d5:42:de:73:72:38:
                    92:84:a0:b0:9a:6c:b6:a6:b0:9c:fe:74:34:f9:6f:aa:
                    87:b1:93:37:5c:59:e8:30:25:ee:26:f6:bc:19:ce:7b:
                    95:30:c2:5d:7f:40:de:9d:e9:8e:b7:3e:ed:7c:92:73:
                    af:02:48:c8:83:25:37:57:b2:97:f2:b5:5b:55:60:70:
                    8a:e0:2a:9e:f2:6b:29:19:b4:79:b2:0a:da:a2:b6:93:
                    38:e3:e7:88:46:8b:9a:25:9c:2f:19:aa:02:5f:36:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        12:aa:98:c1:a6:cc:ef:72:9e:f0:8c:50:85:0b:13:c0:
        ff:8d:f1:43:5a:3d:d0:32:c1:98:e3:04:47:3e:e5:10:
        a0:b9:74:50:97:b4:7b:2d:6a:22:56:77:75:e8:91:ee:
        fa:90:d7:94:57:9e:10:eb:75:17:3d:db:41:41:8c:98:
        cd:5b:cd:6b:8f:05:f5:bc:13:f5:cd:37:a1:d0:62:ad:
        0b:c5:f3:c0:8a:c3:e0:47:cb:de:50:eb:52:ac:32:24:
        14:7c:03:20:64:83:e3:fa:19:51:38:b7:9d:d1:e9:de:
        9a:bd:58:dc:fa:3d:bc:6a:ae:f2:85:e5:49:d3:9c:20
    Fingerprint (MD5):
        ED:C6:D2:32:A1:AB:43:B8:44:28:1C:81:1B:2C:45:B3
    Fingerprint (SHA1):
        2C:6F:E0:C7:4A:E6:BF:1B:FD:77:B6:B9:9F:C0:6A:C5:BE:A5:A0:97


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #9998: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #9999: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der Root.der with flags  -d AllDB    -o OID.2.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193571 (0x432f9be3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:48 2012
            Not After : Tue Nov 28 00:36:48 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:16:db:10:6d:c4:1f:27:cb:9d:55:55:6b:2e:7f:14:
                    a7:9f:39:a9:bd:be:e2:df:9f:6e:a4:41:03:46:79:37:
                    ac:91:79:7a:68:f7:ed:85:eb:25:36:e9:35:9a:d9:ac:
                    65:60:1b:88:23:cd:f9:e2:08:c6:1e:4d:07:46:cd:e7:
                    d1:63:ce:e1:ac:7e:c7:4a:f5:af:d2:35:e5:62:04:b2:
                    fd:62:9e:bb:63:a3:56:27:99:dd:1c:06:e4:f2:45:c0:
                    bc:74:c4:fb:be:cf:16:f5:0a:ad:47:32:13:0d:9c:6b:
                    9f:52:d7:fc:0e:c0:90:66:62:11:c9:62:d0:06:f5:a9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8f:a1:5a:4c:86:c2:d9:e6:af:60:00:2b:ba:2f:71:5c:
        62:d8:73:68:97:b9:15:44:fd:4f:9b:8a:81:18:be:49:
        5b:30:80:8b:4d:33:38:5b:23:6b:e9:be:b7:97:29:83:
        10:e5:9f:9f:7f:32:80:9b:ce:e0:5c:39:71:c3:4b:1d:
        a5:b3:5c:95:4e:c8:e2:9d:42:83:3d:31:69:b1:4b:1a:
        40:e7:b4:7f:a7:fa:86:7c:f4:3a:fd:d6:66:5d:a1:aa:
        49:72:d1:a4:72:35:ab:79:73:ce:98:8a:0d:97:fc:25:
        c1:20:5e:b4:d8:40:f4:e7:78:d1:44:7b:fc:88:25:bb
    Fingerprint (MD5):
        A3:22:BD:A1:10:44:A4:C5:E8:63:61:90:E5:C3:BB:A3
    Fingerprint (SHA1):
        B3:29:7E:0E:10:9A:4E:9B:95:C0:95:C1:E0:6B:B0:1C:7B:F4:ED:BB


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #10000: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.1.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der CA1Root.der  -t CA1Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10001: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der CA1Root.der with flags  -d AllDB    -o OID.2.0  -t CA1Root.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193572 (0x432f9be4)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:50 2012
            Not After : Tue Nov 28 00:36:50 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:8b:2d:3d:0e:fa:bb:32:48:0b:5b:d4:2d:46:10:a3:
                    d9:ad:db:9e:cf:3f:8b:54:a7:e6:67:7b:e0:53:51:1a:
                    aa:d6:85:97:dc:57:81:8c:45:7c:92:d2:f5:39:cc:1d:
                    a1:c6:f6:77:1d:d3:79:c2:e4:6b:06:69:e9:a7:82:cc:
                    89:fd:3a:db:e7:90:40:65:0c:58:1a:da:b7:cb:86:bd:
                    65:b3:62:8f:99:9c:0b:bc:14:11:db:dd:f6:4f:e7:e4:
                    92:f6:57:84:33:d9:5b:69:20:ba:53:f6:cb:ae:07:63:
                    f4:e2:6b:17:ea:f2:5e:1d:54:72:36:18:a0:8a:46:c3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        51:61:83:f8:7c:f0:0f:ca:b9:50:fb:e9:43:8c:c7:fc:
        3e:7b:ed:99:c0:fd:e9:28:fe:cd:31:f1:d9:77:f4:a7:
        77:1e:da:cf:12:47:eb:bf:a7:f0:58:bd:a7:e3:f2:25:
        27:27:31:c5:14:d4:6a:c1:7c:67:c3:24:b4:86:e0:f4:
        b3:94:44:07:e7:2c:59:21:f0:3c:5e:3f:c9:c7:b9:aa:
        21:87:36:d3:e4:f8:43:29:a4:e9:84:6f:be:4e:2e:aa:
        bd:3f:02:1b:d2:dc:66:04:44:ca:4b:ed:bc:ad:bf:18:
        90:83:0f:8c:1d:8b:81:64:ed:4c:ce:b8:b8:f7:dc:18
    Fingerprint (MD5):
        CC:0A:32:6F:E8:FE:39:33:66:7E:C7:42:A2:AC:30:CD
    Fingerprint (SHA1):
        BC:7D:69:11:B1:02:A2:07:A0:21:B1:88:B5:D4:E0:31:6C:F5:3F:88


Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10002: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.1.0  -t CA2CA1.der - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der CA2CA1.der  -t CA2CA1.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10003: Extension2: Verifying certificate(s)  User1CA2.der CA2CA1.der with flags  -d AllDB    -o OID.2.0  -t CA2CA1.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #10004: Extension2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #10005: Extension2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #10006: Extension2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193570 (0x432f9be2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:46 2012
            Not After : Tue Nov 28 00:36:46 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:0a:ca:16:a0:7c:c5:0a:f5:95:eb:c5:8a:2d:e6:c7:
                    82:7a:08:4f:4e:53:5d:33:96:0b:d5:42:de:73:72:38:
                    92:84:a0:b0:9a:6c:b6:a6:b0:9c:fe:74:34:f9:6f:aa:
                    87:b1:93:37:5c:59:e8:30:25:ee:26:f6:bc:19:ce:7b:
                    95:30:c2:5d:7f:40:de:9d:e9:8e:b7:3e:ed:7c:92:73:
                    af:02:48:c8:83:25:37:57:b2:97:f2:b5:5b:55:60:70:
                    8a:e0:2a:9e:f2:6b:29:19:b4:79:b2:0a:da:a2:b6:93:
                    38:e3:e7:88:46:8b:9a:25:9c:2f:19:aa:02:5f:36:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        12:aa:98:c1:a6:cc:ef:72:9e:f0:8c:50:85:0b:13:c0:
        ff:8d:f1:43:5a:3d:d0:32:c1:98:e3:04:47:3e:e5:10:
        a0:b9:74:50:97:b4:7b:2d:6a:22:56:77:75:e8:91:ee:
        fa:90:d7:94:57:9e:10:eb:75:17:3d:db:41:41:8c:98:
        cd:5b:cd:6b:8f:05:f5:bc:13:f5:cd:37:a1:d0:62:ad:
        0b:c5:f3:c0:8a:c3:e0:47:cb:de:50:eb:52:ac:32:24:
        14:7c:03:20:64:83:e3:fa:19:51:38:b7:9d:d1:e9:de:
        9a:bd:58:dc:fa:3d:bc:6a:ae:f2:85:e5:49:d3:9c:20
    Fingerprint (MD5):
        ED:C6:D2:32:A1:AB:43:B8:44:28:1C:81:1B:2C:45:B3
    Fingerprint (SHA1):
        2C:6F:E0:C7:4A:E6:BF:1B:FD:77:B6:B9:9F:C0:6A:C5:BE:A5:A0:97

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10007: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10008: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193571 (0x432f9be3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:48 2012
            Not After : Tue Nov 28 00:36:48 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:16:db:10:6d:c4:1f:27:cb:9d:55:55:6b:2e:7f:14:
                    a7:9f:39:a9:bd:be:e2:df:9f:6e:a4:41:03:46:79:37:
                    ac:91:79:7a:68:f7:ed:85:eb:25:36:e9:35:9a:d9:ac:
                    65:60:1b:88:23:cd:f9:e2:08:c6:1e:4d:07:46:cd:e7:
                    d1:63:ce:e1:ac:7e:c7:4a:f5:af:d2:35:e5:62:04:b2:
                    fd:62:9e:bb:63:a3:56:27:99:dd:1c:06:e4:f2:45:c0:
                    bc:74:c4:fb:be:cf:16:f5:0a:ad:47:32:13:0d:9c:6b:
                    9f:52:d7:fc:0e:c0:90:66:62:11:c9:62:d0:06:f5:a9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8f:a1:5a:4c:86:c2:d9:e6:af:60:00:2b:ba:2f:71:5c:
        62:d8:73:68:97:b9:15:44:fd:4f:9b:8a:81:18:be:49:
        5b:30:80:8b:4d:33:38:5b:23:6b:e9:be:b7:97:29:83:
        10:e5:9f:9f:7f:32:80:9b:ce:e0:5c:39:71:c3:4b:1d:
        a5:b3:5c:95:4e:c8:e2:9d:42:83:3d:31:69:b1:4b:1a:
        40:e7:b4:7f:a7:fa:86:7c:f4:3a:fd:d6:66:5d:a1:aa:
        49:72:d1:a4:72:35:ab:79:73:ce:98:8a:0d:97:fc:25:
        c1:20:5e:b4:d8:40:f4:e7:78:d1:44:7b:fc:88:25:bb
    Fingerprint (MD5):
        A3:22:BD:A1:10:44:A4:C5:E8:63:61:90:E5:C3:BB:A3
    Fingerprint (SHA1):
        B3:29:7E:0E:10:9A:4E:9B:95:C0:95:C1:E0:6B:B0:1C:7B:F4:ED:BB

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #10009: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10010: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193572 (0x432f9be4)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:50 2012
            Not After : Tue Nov 28 00:36:50 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:8b:2d:3d:0e:fa:bb:32:48:0b:5b:d4:2d:46:10:a3:
                    d9:ad:db:9e:cf:3f:8b:54:a7:e6:67:7b:e0:53:51:1a:
                    aa:d6:85:97:dc:57:81:8c:45:7c:92:d2:f5:39:cc:1d:
                    a1:c6:f6:77:1d:d3:79:c2:e4:6b:06:69:e9:a7:82:cc:
                    89:fd:3a:db:e7:90:40:65:0c:58:1a:da:b7:cb:86:bd:
                    65:b3:62:8f:99:9c:0b:bc:14:11:db:dd:f6:4f:e7:e4:
                    92:f6:57:84:33:d9:5b:69:20:ba:53:f6:cb:ae:07:63:
                    f4:e2:6b:17:ea:f2:5e:1d:54:72:36:18:a0:8a:46:c3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        51:61:83:f8:7c:f0:0f:ca:b9:50:fb:e9:43:8c:c7:fc:
        3e:7b:ed:99:c0:fd:e9:28:fe:cd:31:f1:d9:77:f4:a7:
        77:1e:da:cf:12:47:eb:bf:a7:f0:58:bd:a7:e3:f2:25:
        27:27:31:c5:14:d4:6a:c1:7c:67:c3:24:b4:86:e0:f4:
        b3:94:44:07:e7:2c:59:21:f0:3c:5e:3f:c9:c7:b9:aa:
        21:87:36:d3:e4:f8:43:29:a4:e9:84:6f:be:4e:2e:aa:
        bd:3f:02:1b:d2:dc:66:04:44:ca:4b:ed:bc:ad:bf:18:
        90:83:0f:8c:1d:8b:81:64:ed:4c:ce:b8:b8:f7:dc:18
    Fingerprint (MD5):
        CC:0A:32:6F:E8:FE:39:33:66:7E:C7:42:A2:AC:30:CD
    Fingerprint (SHA1):
        BC:7D:69:11:B1:02:A2:07:A0:21:B1:88:B5:D4:E0:31:6C:F5:3F:88

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10011: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10012: Extension2: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193570 (0x432f9be2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:46 2012
            Not After : Tue Nov 28 00:36:46 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:0a:ca:16:a0:7c:c5:0a:f5:95:eb:c5:8a:2d:e6:c7:
                    82:7a:08:4f:4e:53:5d:33:96:0b:d5:42:de:73:72:38:
                    92:84:a0:b0:9a:6c:b6:a6:b0:9c:fe:74:34:f9:6f:aa:
                    87:b1:93:37:5c:59:e8:30:25:ee:26:f6:bc:19:ce:7b:
                    95:30:c2:5d:7f:40:de:9d:e9:8e:b7:3e:ed:7c:92:73:
                    af:02:48:c8:83:25:37:57:b2:97:f2:b5:5b:55:60:70:
                    8a:e0:2a:9e:f2:6b:29:19:b4:79:b2:0a:da:a2:b6:93:
                    38:e3:e7:88:46:8b:9a:25:9c:2f:19:aa:02:5f:36:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        12:aa:98:c1:a6:cc:ef:72:9e:f0:8c:50:85:0b:13:c0:
        ff:8d:f1:43:5a:3d:d0:32:c1:98:e3:04:47:3e:e5:10:
        a0:b9:74:50:97:b4:7b:2d:6a:22:56:77:75:e8:91:ee:
        fa:90:d7:94:57:9e:10:eb:75:17:3d:db:41:41:8c:98:
        cd:5b:cd:6b:8f:05:f5:bc:13:f5:cd:37:a1:d0:62:ad:
        0b:c5:f3:c0:8a:c3:e0:47:cb:de:50:eb:52:ac:32:24:
        14:7c:03:20:64:83:e3:fa:19:51:38:b7:9d:d1:e9:de:
        9a:bd:58:dc:fa:3d:bc:6a:ae:f2:85:e5:49:d3:9c:20
    Fingerprint (MD5):
        ED:C6:D2:32:A1:AB:43:B8:44:28:1C:81:1B:2C:45:B3
    Fingerprint (SHA1):
        2C:6F:E0:C7:4A:E6:BF:1B:FD:77:B6:B9:9F:C0:6A:C5:BE:A5:A0:97

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10013: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193570 (0x432f9be2)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:46 2012
            Not After : Tue Nov 28 00:36:46 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    be:0a:ca:16:a0:7c:c5:0a:f5:95:eb:c5:8a:2d:e6:c7:
                    82:7a:08:4f:4e:53:5d:33:96:0b:d5:42:de:73:72:38:
                    92:84:a0:b0:9a:6c:b6:a6:b0:9c:fe:74:34:f9:6f:aa:
                    87:b1:93:37:5c:59:e8:30:25:ee:26:f6:bc:19:ce:7b:
                    95:30:c2:5d:7f:40:de:9d:e9:8e:b7:3e:ed:7c:92:73:
                    af:02:48:c8:83:25:37:57:b2:97:f2:b5:5b:55:60:70:
                    8a:e0:2a:9e:f2:6b:29:19:b4:79:b2:0a:da:a2:b6:93:
                    38:e3:e7:88:46:8b:9a:25:9c:2f:19:aa:02:5f:36:33
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        12:aa:98:c1:a6:cc:ef:72:9e:f0:8c:50:85:0b:13:c0:
        ff:8d:f1:43:5a:3d:d0:32:c1:98:e3:04:47:3e:e5:10:
        a0:b9:74:50:97:b4:7b:2d:6a:22:56:77:75:e8:91:ee:
        fa:90:d7:94:57:9e:10:eb:75:17:3d:db:41:41:8c:98:
        cd:5b:cd:6b:8f:05:f5:bc:13:f5:cd:37:a1:d0:62:ad:
        0b:c5:f3:c0:8a:c3:e0:47:cb:de:50:eb:52:ac:32:24:
        14:7c:03:20:64:83:e3:fa:19:51:38:b7:9d:d1:e9:de:
        9a:bd:58:dc:fa:3d:bc:6a:ae:f2:85:e5:49:d3:9c:20
    Fingerprint (MD5):
        ED:C6:D2:32:A1:AB:43:B8:44:28:1C:81:1B:2C:45:B3
    Fingerprint (SHA1):
        2C:6F:E0:C7:4A:E6:BF:1B:FD:77:B6:B9:9F:C0:6A:C5:BE:A5:A0:97

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10014: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193571 (0x432f9be3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:48 2012
            Not After : Tue Nov 28 00:36:48 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:16:db:10:6d:c4:1f:27:cb:9d:55:55:6b:2e:7f:14:
                    a7:9f:39:a9:bd:be:e2:df:9f:6e:a4:41:03:46:79:37:
                    ac:91:79:7a:68:f7:ed:85:eb:25:36:e9:35:9a:d9:ac:
                    65:60:1b:88:23:cd:f9:e2:08:c6:1e:4d:07:46:cd:e7:
                    d1:63:ce:e1:ac:7e:c7:4a:f5:af:d2:35:e5:62:04:b2:
                    fd:62:9e:bb:63:a3:56:27:99:dd:1c:06:e4:f2:45:c0:
                    bc:74:c4:fb:be:cf:16:f5:0a:ad:47:32:13:0d:9c:6b:
                    9f:52:d7:fc:0e:c0:90:66:62:11:c9:62:d0:06:f5:a9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8f:a1:5a:4c:86:c2:d9:e6:af:60:00:2b:ba:2f:71:5c:
        62:d8:73:68:97:b9:15:44:fd:4f:9b:8a:81:18:be:49:
        5b:30:80:8b:4d:33:38:5b:23:6b:e9:be:b7:97:29:83:
        10:e5:9f:9f:7f:32:80:9b:ce:e0:5c:39:71:c3:4b:1d:
        a5:b3:5c:95:4e:c8:e2:9d:42:83:3d:31:69:b1:4b:1a:
        40:e7:b4:7f:a7:fa:86:7c:f4:3a:fd:d6:66:5d:a1:aa:
        49:72:d1:a4:72:35:ab:79:73:ce:98:8a:0d:97:fc:25:
        c1:20:5e:b4:d8:40:f4:e7:78:d1:44:7b:fc:88:25:bb
    Fingerprint (MD5):
        A3:22:BD:A1:10:44:A4:C5:E8:63:61:90:E5:C3:BB:A3
    Fingerprint (SHA1):
        B3:29:7E:0E:10:9A:4E:9B:95:C0:95:C1:E0:6B:B0:1C:7B:F4:ED:BB

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #10015: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193571 (0x432f9be3)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:48 2012
            Not After : Tue Nov 28 00:36:48 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b6:16:db:10:6d:c4:1f:27:cb:9d:55:55:6b:2e:7f:14:
                    a7:9f:39:a9:bd:be:e2:df:9f:6e:a4:41:03:46:79:37:
                    ac:91:79:7a:68:f7:ed:85:eb:25:36:e9:35:9a:d9:ac:
                    65:60:1b:88:23:cd:f9:e2:08:c6:1e:4d:07:46:cd:e7:
                    d1:63:ce:e1:ac:7e:c7:4a:f5:af:d2:35:e5:62:04:b2:
                    fd:62:9e:bb:63:a3:56:27:99:dd:1c:06:e4:f2:45:c0:
                    bc:74:c4:fb:be:cf:16:f5:0a:ad:47:32:13:0d:9c:6b:
                    9f:52:d7:fc:0e:c0:90:66:62:11:c9:62:d0:06:f5:a9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8f:a1:5a:4c:86:c2:d9:e6:af:60:00:2b:ba:2f:71:5c:
        62:d8:73:68:97:b9:15:44:fd:4f:9b:8a:81:18:be:49:
        5b:30:80:8b:4d:33:38:5b:23:6b:e9:be:b7:97:29:83:
        10:e5:9f:9f:7f:32:80:9b:ce:e0:5c:39:71:c3:4b:1d:
        a5:b3:5c:95:4e:c8:e2:9d:42:83:3d:31:69:b1:4b:1a:
        40:e7:b4:7f:a7:fa:86:7c:f4:3a:fd:d6:66:5d:a1:aa:
        49:72:d1:a4:72:35:ab:79:73:ce:98:8a:0d:97:fc:25:
        c1:20:5e:b4:d8:40:f4:e7:78:d1:44:7b:fc:88:25:bb
    Fingerprint (MD5):
        A3:22:BD:A1:10:44:A4:C5:E8:63:61:90:E5:C3:BB:A3
    Fingerprint (SHA1):
        B3:29:7E:0E:10:9A:4E:9B:95:C0:95:C1:E0:6B:B0:1C:7B:F4:ED:BB

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #10016: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193572 (0x432f9be4)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:50 2012
            Not After : Tue Nov 28 00:36:50 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:8b:2d:3d:0e:fa:bb:32:48:0b:5b:d4:2d:46:10:a3:
                    d9:ad:db:9e:cf:3f:8b:54:a7:e6:67:7b:e0:53:51:1a:
                    aa:d6:85:97:dc:57:81:8c:45:7c:92:d2:f5:39:cc:1d:
                    a1:c6:f6:77:1d:d3:79:c2:e4:6b:06:69:e9:a7:82:cc:
                    89:fd:3a:db:e7:90:40:65:0c:58:1a:da:b7:cb:86:bd:
                    65:b3:62:8f:99:9c:0b:bc:14:11:db:dd:f6:4f:e7:e4:
                    92:f6:57:84:33:d9:5b:69:20:ba:53:f6:cb:ae:07:63:
                    f4:e2:6b:17:ea:f2:5e:1d:54:72:36:18:a0:8a:46:c3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: OID.2.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        51:61:83:f8:7c:f0:0f:ca:b9:50:fb:e9:43:8c:c7:fc:
        3e:7b:ed:99:c0:fd:e9:28:fe:cd:31:f1:d9:77:f4:a7:
        77:1e:da:cf:12:47:eb:bf:a7:f0:58:bd:a7:e3:f2:25:
        27:27:31:c5:14:d4:6a:c1:7c:67:c3:24:b4:86:e0:f4:
        b3:94:44:07:e7:2c:59:21:f0:3c:5e:3f:c9:c7:b9:aa:
        21:87:36:d3:e4:f8:43:29:a4:e9:84:6f:be:4e:2e:aa:
        bd:3f:02:1b:d2:dc:66:04:44:ca:4b:ed:bc:ad:bf:18:
        90:83:0f:8c:1d:8b:81:64:ed:4c:ce:b8:b8:f7:dc:18
    Fingerprint (MD5):
        CC:0A:32:6F:E8:FE:39:33:66:7E:C7:42:A2:AC:30:CD
    Fingerprint (SHA1):
        BC:7D:69:11:B1:02:A2:07:A0:21:B1:88:B5:D4:E0:31:6C:F5:3F:88

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #10017: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193572 (0x432f9be4)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:36:50 2012
            Not After : Tue Nov 28 00:36:50 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b8:8b:2d:3d:0e:fa:bb:32:48:0b:5b:d4:2d:46:10:a3:
                    d9:ad:db:9e:cf:3f:8b:54:a7:e6:67:7b:e0:53:51:1a:
                    aa:d6:85:97:dc:57:81:8c:45:7c:92:d2:f5:39:cc:1d:
                    a1:c6:f6:77:1d:d3:79:c2:e4:6b:06:69:e9:a7:82:cc:
                    89:fd:3a:db:e7:90:40:65:0c:58:1a:da:b7:cb:86:bd:
                    65:b3:62:8f:99:9c:0b:bc:14:11:db:dd:f6:4f:e7:e4:
                    92:f6:57:84:33:d9:5b:69:20:ba:53:f6:cb:ae:07:63:
                    f4:e2:6b:17:ea:f2:5e:1d:54:72:36:18:a0:8a:46:c3
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        51:61:83:f8:7c:f0:0f:ca:b9:50:fb:e9:43:8c:c7:fc:
        3e:7b:ed:99:c0:fd:e9:28:fe:cd:31:f1:d9:77:f4:a7:
        77:1e:da:cf:12:47:eb:bf:a7:f0:58:bd:a7:e3:f2:25:
        27:27:31:c5:14:d4:6a:c1:7c:67:c3:24:b4:86:e0:f4:
        b3:94:44:07:e7:2c:59:21:f0:3c:5e:3f:c9:c7:b9:aa:
        21:87:36:d3:e4:f8:43:29:a4:e9:84:6f:be:4e:2e:aa:
        bd:3f:02:1b:d2:dc:66:04:44:ca:4b:ed:bc:ad:bf:18:
        90:83:0f:8c:1d:8b:81:64:ed:4c:ce:b8:b8:f7:dc:18
    Fingerprint (MD5):
        CC:0A:32:6F:E8:FE:39:33:66:7E:C7:42:A2:AC:30:CD
    Fingerprint (SHA1):
        BC:7D:69:11:B1:02:A2:07:A0:21:B1:88:B5:D4:E0:31:6C:F5:3F:88

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User2 EE,O=User2,C=US"
Returned value is 0, expected result is pass
chains.sh: #10018: Extension2: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t CA2 - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #10019: AnyPolicy: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193575 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10020: AnyPolicy: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #10021: AnyPolicy: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10022: AnyPolicy: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10023: AnyPolicy: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1127193576   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10024: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
chains.sh: #10025: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #10026: AnyPolicy: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10027: AnyPolicy: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127193577   --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
0
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #10028: AnyPolicy: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #10029: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #10030: AnyPolicy: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10031: AnyPolicy: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1127193578   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10032: AnyPolicy: Creating certficate CA3CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA3CA1.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der
chains.sh: #10033: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database  - PASSED
chains.sh: Creating DB User1DB
certutil -N -d User1DB -f User1DB/dbpasswd
chains.sh: #10034: AnyPolicy: Creating DB User1DB  - PASSED
chains.sh: Creating EE certifiate request User1Req.der
certutil -s "CN=User1 EE, O=User1, C=US"  -R  -d User1DB -f User1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o User1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10035: AnyPolicy: Creating EE certifiate request User1Req.der  - PASSED
chains.sh: Creating certficate User1CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1127193579   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10036: AnyPolicy: Creating certficate User1CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User1CA2.der to User1DB database
certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der
chains.sh: #10037: AnyPolicy: Importing certificate User1CA2.der to User1DB database  - PASSED
chains.sh: Creating DB User2DB
certutil -N -d User2DB -f User2DB/dbpasswd
chains.sh: #10038: AnyPolicy: Creating DB User2DB  - PASSED
chains.sh: Creating EE certifiate request User2Req.der
certutil -s "CN=User2 EE, O=User2, C=US"  -R  -d User2DB -f User2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o User2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10039: AnyPolicy: Creating EE certifiate request User2Req.der  - PASSED
chains.sh: Creating certficate User2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1127193580   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10040: AnyPolicy: Creating certficate User2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate User2CA2.der to User2DB database
certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der
chains.sh: #10041: AnyPolicy: Importing certificate User2CA2.der to User2DB database  - PASSED
chains.sh: Creating DB User3DB
certutil -N -d User3DB -f User3DB/dbpasswd
chains.sh: #10042: AnyPolicy: Creating DB User3DB  - PASSED
chains.sh: Creating EE certifiate request User3Req.der
certutil -s "CN=User3 EE, O=User3, C=US"  -R  -d User3DB -f User3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o User3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10043: AnyPolicy: Creating EE certifiate request User3Req.der  - PASSED
chains.sh: Creating certficate User3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1127193581   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10044: AnyPolicy: Creating certficate User3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate User3CA3.der to User3DB database
certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der
chains.sh: #10045: AnyPolicy: Importing certificate User3CA3.der to User3DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #10046: AnyPolicy: Creating DB AllDB  - PASSED
chains.sh: Importing certificate RootCA.der to AllDB database
certutil -A -n RootCA  -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der
chains.sh: #10047: AnyPolicy: Importing certificate RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1RootCA.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der
chains.sh: #10048: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #10049: AnyPolicy: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA1.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der
chains.sh: #10050: AnyPolicy: Importing certificate CA3CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User1CA2.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193575 (0x432f9be7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:37:01 2012
            Not After : Tue Nov 28 00:37:01 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:05:11:76:29:37:5f:62:84:ca:27:f8:b3:e6:6e:fa:
                    6d:68:0d:c7:f0:0e:2b:4a:97:4d:ff:f6:c5:90:49:4f:
                    d8:8d:11:38:25:a1:0a:30:df:da:11:bc:87:ad:79:8b:
                    fd:8c:f1:eb:6d:3d:fe:57:fa:e9:91:af:ca:08:25:8c:
                    d1:a8:84:38:bc:4e:01:91:48:4d:70:28:87:94:32:24:
                    27:e1:dd:c2:de:65:6b:b9:b8:7b:b8:f4:55:6d:2c:7c:
                    8a:53:64:1f:18:fa:b1:41:0f:88:e6:1d:e4:1d:c2:b7:
                    bb:ee:0a:da:57:d1:99:58:59:64:40:5a:e0:5f:e1:cf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        bb:5f:2a:29:ff:65:81:88:bf:4a:05:dc:99:8a:79:27:
        64:9e:76:e8:d1:dd:5e:5b:41:31:d3:cf:66:d1:f5:db:
        9c:e0:c2:0c:dd:4a:66:57:a4:dc:02:a5:a2:08:a7:75:
        87:29:0b:e6:ea:d1:7d:5b:3e:b0:2d:bc:69:1e:13:c2:
        3c:fa:72:3f:ba:85:23:7a:c1:cd:d0:29:c8:b4:58:24:
        51:1a:24:9a:c4:2a:82:73:15:f0:57:0e:98:b5:96:8e:
        2d:6f:dc:45:ec:9a:52:4f:89:9d:9c:eb:76:43:58:22:
        42:16:67:8e:48:fc:48:f3:e7:bc:bb:0b:a7:c2:71:5e
    Fingerprint (MD5):
        51:CB:34:B0:AA:8C:5E:56:BF:A5:EA:12:1B:54:7D:9E
    Fingerprint (SHA1):
        39:EE:63:41:07:5C:77:27:AB:75:1C:73:89:FA:63:A1:14:D1:FD:29

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User1 EE,O=User1,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10051: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User1CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10052: AnyPolicy: Verifying certificate(s)  User1CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10053: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User2CA2.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10054: AnyPolicy: Verifying certificate(s)  User2CA2.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.1.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.1.0  User3CA3.der  -t RootCA
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193575 (0x432f9be7)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:37:01 2012
            Not After : Tue Nov 28 00:37:01 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c3:05:11:76:29:37:5f:62:84:ca:27:f8:b3:e6:6e:fa:
                    6d:68:0d:c7:f0:0e:2b:4a:97:4d:ff:f6:c5:90:49:4f:
                    d8:8d:11:38:25:a1:0a:30:df:da:11:bc:87:ad:79:8b:
                    fd:8c:f1:eb:6d:3d:fe:57:fa:e9:91:af:ca:08:25:8c:
                    d1:a8:84:38:bc:4e:01:91:48:4d:70:28:87:94:32:24:
                    27:e1:dd:c2:de:65:6b:b9:b8:7b:b8:f4:55:6d:2c:7c:
                    8a:53:64:1f:18:fa:b1:41:0f:88:e6:1d:e4:1d:c2:b7:
                    bb:ee:0a:da:57:d1:99:58:59:64:40:5a:e0:5f:e1:cf
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        bb:5f:2a:29:ff:65:81:88:bf:4a:05:dc:99:8a:79:27:
        64:9e:76:e8:d1:dd:5e:5b:41:31:d3:cf:66:d1:f5:db:
        9c:e0:c2:0c:dd:4a:66:57:a4:dc:02:a5:a2:08:a7:75:
        87:29:0b:e6:ea:d1:7d:5b:3e:b0:2d:bc:69:1e:13:c2:
        3c:fa:72:3f:ba:85:23:7a:c1:cd:d0:29:c8:b4:58:24:
        51:1a:24:9a:c4:2a:82:73:15:f0:57:0e:98:b5:96:8e:
        2d:6f:dc:45:ec:9a:52:4f:89:9d:9c:eb:76:43:58:22:
        42:16:67:8e:48:fc:48:f3:e7:bc:bb:0b:a7:c2:71:5e
    Fingerprint (MD5):
        51:CB:34:B0:AA:8C:5E:56:BF:A5:EA:12:1B:54:7D:9E
    Fingerprint (SHA1):
        39:EE:63:41:07:5C:77:27:AB:75:1C:73:89:FA:63:A1:14:D1:FD:29

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User3 EE,O=User3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10055: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.1.0  -t RootCA - PASSED
chains.sh: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.2.0  -t RootCA
vfychain -d AllDB -pp -vv     -o OID.2.0  User3CA3.der  -t RootCA
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. RootCA [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10056: AnyPolicy: Verifying certificate(s)  User3CA3.der with flags  -d AllDB    -o OID.2.0  -t RootCA - PASSED
chains.sh: Creating DB RootCADB
certutil -N -d RootCADB -f RootCADB/dbpasswd
chains.sh: #10057: AnyPolicyWithLevel: Creating DB RootCADB  - PASSED
chains.sh: Creating Root CA RootCA
certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA  -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193582 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10058: AnyPolicyWithLevel: Creating Root CA RootCA  - PASSED
chains.sh: Exporting Root CA RootCA.der
certutil -L -d RootCADB -r -n RootCA -o RootCA.der
chains.sh: #10059: AnyPolicyWithLevel: Exporting Root CA RootCA.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10060: AnyPolicyWithLevel: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10061: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1127193583   --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #10062: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA1RootCA.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der
chains.sh: #10063: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database  - PASSED
chains.sh: Creating DB CA12DB
certutil -N -d CA12DB -f CA12DB/dbpasswd
chains.sh: #10064: AnyPolicyWithLevel: Creating DB CA12DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA12Req.der
certutil -s "CN=CA12 Intermediate, O=CA12, C=US"  -R -2 -d CA12DB -f CA12DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA12Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10065: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der  - PASSED
chains.sh: Creating certficate CA12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1127193584   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10066: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA12CA1.der to CA12DB database
certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der
chains.sh: #10067: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database  - PASSED
chains.sh: Creating DB CA13DB
certutil -N -d CA13DB -f CA13DB/dbpasswd
chains.sh: #10068: AnyPolicyWithLevel: Creating DB CA13DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA13Req.der
certutil -s "CN=CA13 Intermediate, O=CA13, C=US"  -R -2 -d CA13DB -f CA13DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA13Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10069: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der  - PASSED
chains.sh: Creating certficate CA13CA12.der signed by CA12
certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1127193585   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10070: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12  - PASSED
chains.sh: Importing certificate CA13CA12.der to CA13DB database
certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der
chains.sh: #10071: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #10072: AnyPolicyWithLevel: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10073: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA13.der signed by CA13
certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1127193586   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10074: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13  - PASSED
chains.sh: Importing certificate EE1CA13.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der
chains.sh: #10075: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database  - PASSED
chains.sh: Creating DB CA22DB
certutil -N -d CA22DB -f CA22DB/dbpasswd
chains.sh: #10076: AnyPolicyWithLevel: Creating DB CA22DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA22Req.der
certutil -s "CN=CA22 Intermediate, O=CA22, C=US"  -R -2 -d CA22DB -f CA22DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA22Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10077: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der  - PASSED
chains.sh: Creating certficate CA22CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1127193587   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10078: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA22CA1.der to CA22DB database
certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der
chains.sh: #10079: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database  - PASSED
chains.sh: Creating DB CA23DB
certutil -N -d CA23DB -f CA23DB/dbpasswd
chains.sh: #10080: AnyPolicyWithLevel: Creating DB CA23DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA23Req.der
certutil -s "CN=CA23 Intermediate, O=CA23, C=US"  -R -2 -d CA23DB -f CA23DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA23Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10081: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der  - PASSED
chains.sh: Creating certficate CA23CA22.der signed by CA22
certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1127193588   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10082: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22  - PASSED
chains.sh: Importing certificate CA23CA22.der to CA23DB database
certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der
chains.sh: #10083: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #10084: AnyPolicyWithLevel: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10085: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA23.der signed by CA23
certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1127193589   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10086: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23  - PASSED
chains.sh: Importing certificate EE2CA23.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der
chains.sh: #10087: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database  - PASSED
chains.sh: Creating DB CA32DB
certutil -N -d CA32DB -f CA32DB/dbpasswd
chains.sh: #10088: AnyPolicyWithLevel: Creating DB CA32DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA32Req.der
certutil -s "CN=CA32 Intermediate, O=CA32, C=US"  -R -2 -d CA32DB -f CA32DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA32Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10089: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der  - PASSED
chains.sh: Creating certficate CA32CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1127193590   --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n
1
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #10090: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA32CA1.der to CA32DB database
certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der
chains.sh: #10091: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database  - PASSED
chains.sh: Creating DB CA33DB
certutil -N -d CA33DB -f CA33DB/dbpasswd
chains.sh: #10092: AnyPolicyWithLevel: Creating DB CA33DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA33Req.der
certutil -s "CN=CA33 Intermediate, O=CA33, C=US"  -R -2 -d CA33DB -f CA33DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA33Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10093: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der  - PASSED
chains.sh: Creating certficate CA33CA32.der signed by CA32
certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1127193591   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10094: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32  - PASSED
chains.sh: Importing certificate CA33CA32.der to CA33DB database
certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der
chains.sh: #10095: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #10096: AnyPolicyWithLevel: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US"  -R  -d EE3DB -f EE3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10097: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA33.der signed by CA33
certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1127193592   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10098: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33  - PASSED
chains.sh: Importing certificate EE3CA33.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der
chains.sh: #10099: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database  - PASSED
chains.sh: Creating DB CA42DB
certutil -N -d CA42DB -f CA42DB/dbpasswd
chains.sh: #10100: AnyPolicyWithLevel: Creating DB CA42DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA42Req.der
certutil -s "CN=CA42 Intermediate, O=CA42, C=US"  -R -2 -d CA42DB -f CA42DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA42Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10101: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der  - PASSED
chains.sh: Creating certficate CA42CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1127193593   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10102: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA42CA1.der to CA42DB database
certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der
chains.sh: #10103: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database  - PASSED
chains.sh: Creating DB CA43DB
certutil -N -d CA43DB -f CA43DB/dbpasswd
chains.sh: #10104: AnyPolicyWithLevel: Creating DB CA43DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA43Req.der
certutil -s "CN=CA43 Intermediate, O=CA43, C=US"  -R -2 -d CA43DB -f CA43DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA43Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10105: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der  - PASSED
chains.sh: Creating certficate CA43CA42.der signed by CA42
certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1127193594   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10106: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42  - PASSED
chains.sh: Importing certificate CA43CA42.der to CA43DB database
certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der
chains.sh: #10107: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #10108: AnyPolicyWithLevel: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US"  -R  -d EE4DB -f EE4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE4Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10109: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA43.der signed by CA43
certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1127193595   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10110: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43  - PASSED
chains.sh: Importing certificate EE4CA43.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der
chains.sh: #10111: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database  - PASSED
chains.sh: Creating DB CA52DB
certutil -N -d CA52DB -f CA52DB/dbpasswd
chains.sh: #10112: AnyPolicyWithLevel: Creating DB CA52DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA52Req.der
certutil -s "CN=CA52 Intermediate, O=CA52, C=US"  -R -2 -d CA52DB -f CA52DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA52Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10113: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der  - PASSED
chains.sh: Creating certficate CA52CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1127193596   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
y
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10114: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA52CA1.der to CA52DB database
certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der
chains.sh: #10115: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database  - PASSED
chains.sh: Creating DB CA53DB
certutil -N -d CA53DB -f CA53DB/dbpasswd
chains.sh: #10116: AnyPolicyWithLevel: Creating DB CA53DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA53Req.der
certutil -s "CN=CA53 Intermediate, O=CA53, C=US"  -R -2 -d CA53DB -f CA53DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA53Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10117: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der  - PASSED
chains.sh: Creating certficate CA53CA52.der signed by CA52
certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1127193597   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10118: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52  - PASSED
chains.sh: Importing certificate CA53CA52.der to CA53DB database
certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der
chains.sh: #10119: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database  - PASSED
chains.sh: Creating DB EE5DB
certutil -N -d EE5DB -f EE5DB/dbpasswd
chains.sh: #10120: AnyPolicyWithLevel: Creating DB EE5DB  - PASSED
chains.sh: Creating EE certifiate request EE5Req.der
certutil -s "CN=EE5 EE, O=EE5, C=US"  -R  -d EE5DB -f EE5DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE5Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10121: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der  - PASSED
chains.sh: Creating certficate EE5CA53.der signed by CA53
certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1127193598   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10122: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53  - PASSED
chains.sh: Importing certificate EE5CA53.der to EE5DB database
certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der
chains.sh: #10123: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database  - PASSED
chains.sh: Creating DB CA61DB
certutil -N -d CA61DB -f CA61DB/dbpasswd
chains.sh: #10124: AnyPolicyWithLevel: Creating DB CA61DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA61Req.der
certutil -s "CN=CA61 Intermediate, O=CA61, C=US"  -R -2 -d CA61DB -f CA61DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA61Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10125: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der  - PASSED
chains.sh: Creating certficate CA61RootCA.der signed by RootCA
certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1127193599   --extCP --extIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n
5
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter the number of certs in the path permitted to use anyPolicy.
(press Enter for 0) > Is this a critical extension [y/N]?
chains.sh: #10126: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA  - PASSED
chains.sh: Importing certificate CA61RootCA.der to CA61DB database
certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der
chains.sh: #10127: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database  - PASSED
chains.sh: Creating DB CA62DB
certutil -N -d CA62DB -f CA62DB/dbpasswd
chains.sh: #10128: AnyPolicyWithLevel: Creating DB CA62DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA62Req.der
certutil -s "CN=CA62 Intermediate, O=CA62, C=US"  -R -2 -d CA62DB -f CA62DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA62Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10129: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der  - PASSED
chains.sh: Creating certficate CA62CA61.der signed by CA61
certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1127193600   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10130: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61  - PASSED
chains.sh: Importing certificate CA62CA61.der to CA62DB database
certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der
chains.sh: #10131: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database  - PASSED
chains.sh: Creating DB EE62DB
certutil -N -d EE62DB -f EE62DB/dbpasswd
chains.sh: #10132: AnyPolicyWithLevel: Creating DB EE62DB  - PASSED
chains.sh: Creating EE certifiate request EE62Req.der
certutil -s "CN=EE62 EE, O=EE62, C=US"  -R  -d EE62DB -f EE62DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE62Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10133: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der  - PASSED
chains.sh: Creating certficate EE62CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1127193601   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10134: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate EE62CA62.der to EE62DB database
certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der
chains.sh: #10135: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database  - PASSED
chains.sh: Creating DB CA63DB
certutil -N -d CA63DB -f CA63DB/dbpasswd
chains.sh: #10136: AnyPolicyWithLevel: Creating DB CA63DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA63Req.der
certutil -s "CN=CA63 Intermediate, O=CA63, C=US"  -R -2 -d CA63DB -f CA63DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA63Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10137: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der  - PASSED
chains.sh: Creating certficate CA63CA62.der signed by CA62
certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1127193602   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10138: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62  - PASSED
chains.sh: Importing certificate CA63CA62.der to CA63DB database
certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der
chains.sh: #10139: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database  - PASSED
chains.sh: Creating DB EE63DB
certutil -N -d EE63DB -f EE63DB/dbpasswd
chains.sh: #10140: AnyPolicyWithLevel: Creating DB EE63DB  - PASSED
chains.sh: Creating EE certifiate request EE63Req.der
certutil -s "CN=EE63 EE, O=EE63, C=US"  -R  -d EE63DB -f EE63DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE63Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10141: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der  - PASSED
chains.sh: Creating certficate EE63CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1127193603   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10142: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate EE63CA63.der to EE63DB database
certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der
chains.sh: #10143: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database  - PASSED
chains.sh: Creating DB CA64DB
certutil -N -d CA64DB -f CA64DB/dbpasswd
chains.sh: #10144: AnyPolicyWithLevel: Creating DB CA64DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA64Req.der
certutil -s "CN=CA64 Intermediate, O=CA64, C=US"  -R -2 -d CA64DB -f CA64DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA64Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10145: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der  - PASSED
chains.sh: Creating certficate CA64CA63.der signed by CA63
certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1127193604   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10146: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63  - PASSED
chains.sh: Importing certificate CA64CA63.der to CA64DB database
certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der
chains.sh: #10147: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database  - PASSED
chains.sh: Creating DB EE64DB
certutil -N -d EE64DB -f EE64DB/dbpasswd
chains.sh: #10148: AnyPolicyWithLevel: Creating DB EE64DB  - PASSED
chains.sh: Creating EE certifiate request EE64Req.der
certutil -s "CN=EE64 EE, O=EE64, C=US"  -R  -d EE64DB -f EE64DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE64Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10149: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der  - PASSED
chains.sh: Creating certficate EE64CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1127193605   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10150: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate EE64CA64.der to EE64DB database
certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der
chains.sh: #10151: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database  - PASSED
chains.sh: Creating DB CA65DB
certutil -N -d CA65DB -f CA65DB/dbpasswd
chains.sh: #10152: AnyPolicyWithLevel: Creating DB CA65DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA65Req.der
certutil -s "CN=CA65 Intermediate, O=CA65, C=US"  -R -2 -d CA65DB -f CA65DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA65Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10153: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der  - PASSED
chains.sh: Creating certficate CA65CA64.der signed by CA64
certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1127193606   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10154: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64  - PASSED
chains.sh: Importing certificate CA65CA64.der to CA65DB database
certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der
chains.sh: #10155: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database  - PASSED
chains.sh: Creating DB EE65DB
certutil -N -d EE65DB -f EE65DB/dbpasswd
chains.sh: #10156: AnyPolicyWithLevel: Creating DB EE65DB  - PASSED
chains.sh: Creating EE certifiate request EE65Req.der
certutil -s "CN=EE65 EE, O=EE65, C=US"  -R  -d EE65DB -f EE65DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE65Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10157: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der  - PASSED
chains.sh: Creating certficate EE65CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1127193607   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10158: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate EE65CA65.der to EE65DB database
certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der
chains.sh: #10159: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database  - PASSED
chains.sh: Creating DB CA66DB
certutil -N -d CA66DB -f CA66DB/dbpasswd
chains.sh: #10160: AnyPolicyWithLevel: Creating DB CA66DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA66Req.der
certutil -s "CN=CA66 Intermediate, O=CA66, C=US"  -R -2 -d CA66DB -f CA66DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA66Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10161: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der  - PASSED
chains.sh: Creating certficate CA66CA65.der signed by CA65
certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1127193608   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10162: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65  - PASSED
chains.sh: Importing certificate CA66CA65.der to CA66DB database
certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der
chains.sh: #10163: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database  - PASSED
chains.sh: Creating DB EE66DB
certutil -N -d EE66DB -f EE66DB/dbpasswd
chains.sh: #10164: AnyPolicyWithLevel: Creating DB EE66DB  - PASSED
chains.sh: Creating EE certifiate request EE66Req.der
certutil -s "CN=EE66 EE, O=EE66, C=US"  -R  -d EE66DB -f EE66DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE66Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10165: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der  - PASSED
chains.sh: Creating certficate EE66CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1127193609   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10166: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate EE66CA66.der to EE66DB database
certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der
chains.sh: #10167: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database  - PASSED
chains.sh: Creating DB CA67DB
certutil -N -d CA67DB -f CA67DB/dbpasswd
chains.sh: #10168: AnyPolicyWithLevel: Creating DB CA67DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA67Req.der
certutil -s "CN=CA67 Intermediate, O=CA67, C=US"  -R -2 -d CA67DB -f CA67DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA67Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10169: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der  - PASSED
chains.sh: Creating certficate CA67CA66.der signed by CA66
certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1127193610   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
any
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10170: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66  - PASSED
chains.sh: Importing certificate CA67CA66.der to CA67DB database
certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der
chains.sh: #10171: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database  - PASSED
chains.sh: Creating DB EE67DB
certutil -N -d EE67DB -f EE67DB/dbpasswd
chains.sh: #10172: AnyPolicyWithLevel: Creating DB EE67DB  - PASSED
chains.sh: Creating EE certifiate request EE67Req.der
certutil -s "CN=EE67 EE, O=EE67, C=US"  -R  -d EE67DB -f EE67DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE67Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10173: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der  - PASSED
chains.sh: Creating certficate EE67CA67.der signed by CA67
certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1127193611   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10174: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67  - PASSED
chains.sh: Importing certificate EE67CA67.der to EE67DB database
certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der
chains.sh: #10175: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #10176: AnyPolicyWithLevel: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193582 (0x432f9bee)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:37:17 2012
            Not After : Tue Nov 28 00:37:17 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f9:3e:20:78:6f:d2:42:0e:c8:b7:d3:26:46:5b:e5:0b:
                    ba:cd:33:62:59:78:ba:25:7b:1e:68:16:6b:c8:8e:b5:
                    4a:65:c4:d7:6f:51:14:35:4b:88:86:6a:cc:eb:46:e3:
                    00:7d:22:ac:57:17:ba:0a:cb:60:33:51:ac:60:27:10:
                    ea:12:17:7e:2c:b1:24:c5:5c:3c:9f:fc:b2:6b:33:2e:
                    a9:db:1a:e2:18:a9:07:75:a4:ea:49:51:61:87:c2:a9:
                    92:c9:25:4f:c7:0b:bf:ee:06:64:63:26:cf:96:e0:26:
                    a9:65:39:c5:bc:18:8d:14:56:50:3d:91:c5:8e:4c:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b6:03:91:37:77:74:fe:47:58:f1:7a:22:0a:c9:18:8b:
        7c:9a:98:b5:0f:6d:29:43:c3:29:05:6f:78:47:d4:e2:
        a4:e7:61:8a:b5:22:5c:33:39:7a:1e:7a:38:bb:d1:05:
        bb:e0:d4:1f:94:9e:20:02:65:e1:95:c8:aa:22:f6:59:
        88:2c:40:db:87:87:29:8a:43:3c:c2:52:3c:04:83:3b:
        fb:04:85:5c:55:d6:bf:58:ae:18:2c:e6:10:3b:34:8b:
        99:60:de:1b:72:3c:d6:bd:ab:16:9a:42:ae:66:ac:31:
        a1:95:1e:85:74:03:88:51:ce:df:cb:2b:47:7e:fc:dc
    Fingerprint (MD5):
        85:69:63:7E:40:E8:7D:F1:B6:A3:A1:09:A7:C0:EA:BE
    Fingerprint (SHA1):
        FA:0D:67:B9:A9:34:68:34:90:5D:BC:80:DE:60:96:E4:DE:12:CF:11


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10177: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10178: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193582 (0x432f9bee)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:37:17 2012
            Not After : Tue Nov 28 00:37:17 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f9:3e:20:78:6f:d2:42:0e:c8:b7:d3:26:46:5b:e5:0b:
                    ba:cd:33:62:59:78:ba:25:7b:1e:68:16:6b:c8:8e:b5:
                    4a:65:c4:d7:6f:51:14:35:4b:88:86:6a:cc:eb:46:e3:
                    00:7d:22:ac:57:17:ba:0a:cb:60:33:51:ac:60:27:10:
                    ea:12:17:7e:2c:b1:24:c5:5c:3c:9f:fc:b2:6b:33:2e:
                    a9:db:1a:e2:18:a9:07:75:a4:ea:49:51:61:87:c2:a9:
                    92:c9:25:4f:c7:0b:bf:ee:06:64:63:26:cf:96:e0:26:
                    a9:65:39:c5:bc:18:8d:14:56:50:3d:91:c5:8e:4c:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b6:03:91:37:77:74:fe:47:58:f1:7a:22:0a:c9:18:8b:
        7c:9a:98:b5:0f:6d:29:43:c3:29:05:6f:78:47:d4:e2:
        a4:e7:61:8a:b5:22:5c:33:39:7a:1e:7a:38:bb:d1:05:
        bb:e0:d4:1f:94:9e:20:02:65:e1:95:c8:aa:22:f6:59:
        88:2c:40:db:87:87:29:8a:43:3c:c2:52:3c:04:83:3b:
        fb:04:85:5c:55:d6:bf:58:ae:18:2c:e6:10:3b:34:8b:
        99:60:de:1b:72:3c:d6:bd:ab:16:9a:42:ae:66:ac:31:
        a1:95:1e:85:74:03:88:51:ce:df:cb:2b:47:7e:fc:dc
    Fingerprint (MD5):
        85:69:63:7E:40:E8:7D:F1:B6:A3:A1:09:A7:C0:EA:BE
    Fingerprint (SHA1):
        FA:0D:67:B9:A9:34:68:34:90:5D:BC:80:DE:60:96:E4:DE:12:CF:11


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US"
Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10179: AnyPolicyWithLevel: Verifying certificate(s)  EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10180: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10181: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10182: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193582 (0x432f9bee)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:37:17 2012
            Not After : Tue Nov 28 00:37:17 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f9:3e:20:78:6f:d2:42:0e:c8:b7:d3:26:46:5b:e5:0b:
                    ba:cd:33:62:59:78:ba:25:7b:1e:68:16:6b:c8:8e:b5:
                    4a:65:c4:d7:6f:51:14:35:4b:88:86:6a:cc:eb:46:e3:
                    00:7d:22:ac:57:17:ba:0a:cb:60:33:51:ac:60:27:10:
                    ea:12:17:7e:2c:b1:24:c5:5c:3c:9f:fc:b2:6b:33:2e:
                    a9:db:1a:e2:18:a9:07:75:a4:ea:49:51:61:87:c2:a9:
                    92:c9:25:4f:c7:0b:bf:ee:06:64:63:26:cf:96:e0:26:
                    a9:65:39:c5:bc:18:8d:14:56:50:3d:91:c5:8e:4c:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b6:03:91:37:77:74:fe:47:58:f1:7a:22:0a:c9:18:8b:
        7c:9a:98:b5:0f:6d:29:43:c3:29:05:6f:78:47:d4:e2:
        a4:e7:61:8a:b5:22:5c:33:39:7a:1e:7a:38:bb:d1:05:
        bb:e0:d4:1f:94:9e:20:02:65:e1:95:c8:aa:22:f6:59:
        88:2c:40:db:87:87:29:8a:43:3c:c2:52:3c:04:83:3b:
        fb:04:85:5c:55:d6:bf:58:ae:18:2c:e6:10:3b:34:8b:
        99:60:de:1b:72:3c:d6:bd:ab:16:9a:42:ae:66:ac:31:
        a1:95:1e:85:74:03:88:51:ce:df:cb:2b:47:7e:fc:dc
    Fingerprint (MD5):
        85:69:63:7E:40:E8:7D:F1:B6:A3:A1:09:A7:C0:EA:BE
    Fingerprint (SHA1):
        FA:0D:67:B9:A9:34:68:34:90:5D:BC:80:DE:60:96:E4:DE:12:CF:11


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US"
Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10183: AnyPolicyWithLevel: Verifying certificate(s)  EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10184: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10185: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10186: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193582 (0x432f9bee)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:37:17 2012
            Not After : Tue Nov 28 00:37:17 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f9:3e:20:78:6f:d2:42:0e:c8:b7:d3:26:46:5b:e5:0b:
                    ba:cd:33:62:59:78:ba:25:7b:1e:68:16:6b:c8:8e:b5:
                    4a:65:c4:d7:6f:51:14:35:4b:88:86:6a:cc:eb:46:e3:
                    00:7d:22:ac:57:17:ba:0a:cb:60:33:51:ac:60:27:10:
                    ea:12:17:7e:2c:b1:24:c5:5c:3c:9f:fc:b2:6b:33:2e:
                    a9:db:1a:e2:18:a9:07:75:a4:ea:49:51:61:87:c2:a9:
                    92:c9:25:4f:c7:0b:bf:ee:06:64:63:26:cf:96:e0:26:
                    a9:65:39:c5:bc:18:8d:14:56:50:3d:91:c5:8e:4c:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b6:03:91:37:77:74:fe:47:58:f1:7a:22:0a:c9:18:8b:
        7c:9a:98:b5:0f:6d:29:43:c3:29:05:6f:78:47:d4:e2:
        a4:e7:61:8a:b5:22:5c:33:39:7a:1e:7a:38:bb:d1:05:
        bb:e0:d4:1f:94:9e:20:02:65:e1:95:c8:aa:22:f6:59:
        88:2c:40:db:87:87:29:8a:43:3c:c2:52:3c:04:83:3b:
        fb:04:85:5c:55:d6:bf:58:ae:18:2c:e6:10:3b:34:8b:
        99:60:de:1b:72:3c:d6:bd:ab:16:9a:42:ae:66:ac:31:
        a1:95:1e:85:74:03:88:51:ce:df:cb:2b:47:7e:fc:dc
    Fingerprint (MD5):
        85:69:63:7E:40:E8:7D:F1:B6:A3:A1:09:A7:C0:EA:BE
    Fingerprint (SHA1):
        FA:0D:67:B9:A9:34:68:34:90:5D:BC:80:DE:60:96:E4:DE:12:CF:11


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US"
Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10187: AnyPolicyWithLevel: Verifying certificate(s)  EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193582 (0x432f9bee)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:37:17 2012
            Not After : Tue Nov 28 00:37:17 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f9:3e:20:78:6f:d2:42:0e:c8:b7:d3:26:46:5b:e5:0b:
                    ba:cd:33:62:59:78:ba:25:7b:1e:68:16:6b:c8:8e:b5:
                    4a:65:c4:d7:6f:51:14:35:4b:88:86:6a:cc:eb:46:e3:
                    00:7d:22:ac:57:17:ba:0a:cb:60:33:51:ac:60:27:10:
                    ea:12:17:7e:2c:b1:24:c5:5c:3c:9f:fc:b2:6b:33:2e:
                    a9:db:1a:e2:18:a9:07:75:a4:ea:49:51:61:87:c2:a9:
                    92:c9:25:4f:c7:0b:bf:ee:06:64:63:26:cf:96:e0:26:
                    a9:65:39:c5:bc:18:8d:14:56:50:3d:91:c5:8e:4c:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b6:03:91:37:77:74:fe:47:58:f1:7a:22:0a:c9:18:8b:
        7c:9a:98:b5:0f:6d:29:43:c3:29:05:6f:78:47:d4:e2:
        a4:e7:61:8a:b5:22:5c:33:39:7a:1e:7a:38:bb:d1:05:
        bb:e0:d4:1f:94:9e:20:02:65:e1:95:c8:aa:22:f6:59:
        88:2c:40:db:87:87:29:8a:43:3c:c2:52:3c:04:83:3b:
        fb:04:85:5c:55:d6:bf:58:ae:18:2c:e6:10:3b:34:8b:
        99:60:de:1b:72:3c:d6:bd:ab:16:9a:42:ae:66:ac:31:
        a1:95:1e:85:74:03:88:51:ce:df:cb:2b:47:7e:fc:dc
    Fingerprint (MD5):
        85:69:63:7E:40:E8:7D:F1:B6:A3:A1:09:A7:C0:EA:BE
    Fingerprint (SHA1):
        FA:0D:67:B9:A9:34:68:34:90:5D:BC:80:DE:60:96:E4:DE:12:CF:11


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10188: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10189: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193582 (0x432f9bee)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:37:17 2012
            Not After : Tue Nov 28 00:37:17 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f9:3e:20:78:6f:d2:42:0e:c8:b7:d3:26:46:5b:e5:0b:
                    ba:cd:33:62:59:78:ba:25:7b:1e:68:16:6b:c8:8e:b5:
                    4a:65:c4:d7:6f:51:14:35:4b:88:86:6a:cc:eb:46:e3:
                    00:7d:22:ac:57:17:ba:0a:cb:60:33:51:ac:60:27:10:
                    ea:12:17:7e:2c:b1:24:c5:5c:3c:9f:fc:b2:6b:33:2e:
                    a9:db:1a:e2:18:a9:07:75:a4:ea:49:51:61:87:c2:a9:
                    92:c9:25:4f:c7:0b:bf:ee:06:64:63:26:cf:96:e0:26:
                    a9:65:39:c5:bc:18:8d:14:56:50:3d:91:c5:8e:4c:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b6:03:91:37:77:74:fe:47:58:f1:7a:22:0a:c9:18:8b:
        7c:9a:98:b5:0f:6d:29:43:c3:29:05:6f:78:47:d4:e2:
        a4:e7:61:8a:b5:22:5c:33:39:7a:1e:7a:38:bb:d1:05:
        bb:e0:d4:1f:94:9e:20:02:65:e1:95:c8:aa:22:f6:59:
        88:2c:40:db:87:87:29:8a:43:3c:c2:52:3c:04:83:3b:
        fb:04:85:5c:55:d6:bf:58:ae:18:2c:e6:10:3b:34:8b:
        99:60:de:1b:72:3c:d6:bd:ab:16:9a:42:ae:66:ac:31:
        a1:95:1e:85:74:03:88:51:ce:df:cb:2b:47:7e:fc:dc
    Fingerprint (MD5):
        85:69:63:7E:40:E8:7D:F1:B6:A3:A1:09:A7:C0:EA:BE
    Fingerprint (SHA1):
        FA:0D:67:B9:A9:34:68:34:90:5D:BC:80:DE:60:96:E4:DE:12:CF:11


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US"
Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10190: AnyPolicyWithLevel: Verifying certificate(s)  EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10191: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10192: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.2.5.29.32.0  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10193: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB    -o OID.2.5.29.32.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB     -t RootCA.der
vfychain -d AllDB -pp -vv      EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193582 (0x432f9bee)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:37:17 2012
            Not After : Tue Nov 28 00:37:17 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f9:3e:20:78:6f:d2:42:0e:c8:b7:d3:26:46:5b:e5:0b:
                    ba:cd:33:62:59:78:ba:25:7b:1e:68:16:6b:c8:8e:b5:
                    4a:65:c4:d7:6f:51:14:35:4b:88:86:6a:cc:eb:46:e3:
                    00:7d:22:ac:57:17:ba:0a:cb:60:33:51:ac:60:27:10:
                    ea:12:17:7e:2c:b1:24:c5:5c:3c:9f:fc:b2:6b:33:2e:
                    a9:db:1a:e2:18:a9:07:75:a4:ea:49:51:61:87:c2:a9:
                    92:c9:25:4f:c7:0b:bf:ee:06:64:63:26:cf:96:e0:26:
                    a9:65:39:c5:bc:18:8d:14:56:50:3d:91:c5:8e:4c:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b6:03:91:37:77:74:fe:47:58:f1:7a:22:0a:c9:18:8b:
        7c:9a:98:b5:0f:6d:29:43:c3:29:05:6f:78:47:d4:e2:
        a4:e7:61:8a:b5:22:5c:33:39:7a:1e:7a:38:bb:d1:05:
        bb:e0:d4:1f:94:9e:20:02:65:e1:95:c8:aa:22:f6:59:
        88:2c:40:db:87:87:29:8a:43:3c:c2:52:3c:04:83:3b:
        fb:04:85:5c:55:d6:bf:58:ae:18:2c:e6:10:3b:34:8b:
        99:60:de:1b:72:3c:d6:bd:ab:16:9a:42:ae:66:ac:31:
        a1:95:1e:85:74:03:88:51:ce:df:cb:2b:47:7e:fc:dc
    Fingerprint (MD5):
        85:69:63:7E:40:E8:7D:F1:B6:A3:A1:09:A7:C0:EA:BE
    Fingerprint (SHA1):
        FA:0D:67:B9:A9:34:68:34:90:5D:BC:80:DE:60:96:E4:DE:12:CF:11


Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US"
Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US"
Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10194: AnyPolicyWithLevel: Verifying certificate(s)  EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags  -d AllDB     -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193582 (0x432f9bee)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:37:17 2012
            Not After : Tue Nov 28 00:37:17 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f9:3e:20:78:6f:d2:42:0e:c8:b7:d3:26:46:5b:e5:0b:
                    ba:cd:33:62:59:78:ba:25:7b:1e:68:16:6b:c8:8e:b5:
                    4a:65:c4:d7:6f:51:14:35:4b:88:86:6a:cc:eb:46:e3:
                    00:7d:22:ac:57:17:ba:0a:cb:60:33:51:ac:60:27:10:
                    ea:12:17:7e:2c:b1:24:c5:5c:3c:9f:fc:b2:6b:33:2e:
                    a9:db:1a:e2:18:a9:07:75:a4:ea:49:51:61:87:c2:a9:
                    92:c9:25:4f:c7:0b:bf:ee:06:64:63:26:cf:96:e0:26:
                    a9:65:39:c5:bc:18:8d:14:56:50:3d:91:c5:8e:4c:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b6:03:91:37:77:74:fe:47:58:f1:7a:22:0a:c9:18:8b:
        7c:9a:98:b5:0f:6d:29:43:c3:29:05:6f:78:47:d4:e2:
        a4:e7:61:8a:b5:22:5c:33:39:7a:1e:7a:38:bb:d1:05:
        bb:e0:d4:1f:94:9e:20:02:65:e1:95:c8:aa:22:f6:59:
        88:2c:40:db:87:87:29:8a:43:3c:c2:52:3c:04:83:3b:
        fb:04:85:5c:55:d6:bf:58:ae:18:2c:e6:10:3b:34:8b:
        99:60:de:1b:72:3c:d6:bd:ab:16:9a:42:ae:66:ac:31:
        a1:95:1e:85:74:03:88:51:ce:df:cb:2b:47:7e:fc:dc
    Fingerprint (MD5):
        85:69:63:7E:40:E8:7D:F1:B6:A3:A1:09:A7:C0:EA:BE
    Fingerprint (SHA1):
        FA:0D:67:B9:A9:34:68:34:90:5D:BC:80:DE:60:96:E4:DE:12:CF:11


Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US"
Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #10195: AnyPolicyWithLevel: Verifying certificate(s)  EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193582 (0x432f9bee)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:37:17 2012
            Not After : Tue Nov 28 00:37:17 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f9:3e:20:78:6f:d2:42:0e:c8:b7:d3:26:46:5b:e5:0b:
                    ba:cd:33:62:59:78:ba:25:7b:1e:68:16:6b:c8:8e:b5:
                    4a:65:c4:d7:6f:51:14:35:4b:88:86:6a:cc:eb:46:e3:
                    00:7d:22:ac:57:17:ba:0a:cb:60:33:51:ac:60:27:10:
                    ea:12:17:7e:2c:b1:24:c5:5c:3c:9f:fc:b2:6b:33:2e:
                    a9:db:1a:e2:18:a9:07:75:a4:ea:49:51:61:87:c2:a9:
                    92:c9:25:4f:c7:0b:bf:ee:06:64:63:26:cf:96:e0:26:
                    a9:65:39:c5:bc:18:8d:14:56:50:3d:91:c5:8e:4c:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b6:03:91:37:77:74:fe:47:58:f1:7a:22:0a:c9:18:8b:
        7c:9a:98:b5:0f:6d:29:43:c3:29:05:6f:78:47:d4:e2:
        a4:e7:61:8a:b5:22:5c:33:39:7a:1e:7a:38:bb:d1:05:
        bb:e0:d4:1f:94:9e:20:02:65:e1:95:c8:aa:22:f6:59:
        88:2c:40:db:87:87:29:8a:43:3c:c2:52:3c:04:83:3b:
        fb:04:85:5c:55:d6:bf:58:ae:18:2c:e6:10:3b:34:8b:
        99:60:de:1b:72:3c:d6:bd:ab:16:9a:42:ae:66:ac:31:
        a1:95:1e:85:74:03:88:51:ce:df:cb:2b:47:7e:fc:dc
    Fingerprint (MD5):
        85:69:63:7E:40:E8:7D:F1:B6:A3:A1:09:A7:C0:EA:BE
    Fingerprint (SHA1):
        FA:0D:67:B9:A9:34:68:34:90:5D:BC:80:DE:60:96:E4:DE:12:CF:11


Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US"
Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #10196: AnyPolicyWithLevel: Verifying certificate(s)  EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193582 (0x432f9bee)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:37:17 2012
            Not After : Tue Nov 28 00:37:17 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f9:3e:20:78:6f:d2:42:0e:c8:b7:d3:26:46:5b:e5:0b:
                    ba:cd:33:62:59:78:ba:25:7b:1e:68:16:6b:c8:8e:b5:
                    4a:65:c4:d7:6f:51:14:35:4b:88:86:6a:cc:eb:46:e3:
                    00:7d:22:ac:57:17:ba:0a:cb:60:33:51:ac:60:27:10:
                    ea:12:17:7e:2c:b1:24:c5:5c:3c:9f:fc:b2:6b:33:2e:
                    a9:db:1a:e2:18:a9:07:75:a4:ea:49:51:61:87:c2:a9:
                    92:c9:25:4f:c7:0b:bf:ee:06:64:63:26:cf:96:e0:26:
                    a9:65:39:c5:bc:18:8d:14:56:50:3d:91:c5:8e:4c:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b6:03:91:37:77:74:fe:47:58:f1:7a:22:0a:c9:18:8b:
        7c:9a:98:b5:0f:6d:29:43:c3:29:05:6f:78:47:d4:e2:
        a4:e7:61:8a:b5:22:5c:33:39:7a:1e:7a:38:bb:d1:05:
        bb:e0:d4:1f:94:9e:20:02:65:e1:95:c8:aa:22:f6:59:
        88:2c:40:db:87:87:29:8a:43:3c:c2:52:3c:04:83:3b:
        fb:04:85:5c:55:d6:bf:58:ae:18:2c:e6:10:3b:34:8b:
        99:60:de:1b:72:3c:d6:bd:ab:16:9a:42:ae:66:ac:31:
        a1:95:1e:85:74:03:88:51:ce:df:cb:2b:47:7e:fc:dc
    Fingerprint (MD5):
        85:69:63:7E:40:E8:7D:F1:B6:A3:A1:09:A7:C0:EA:BE
    Fingerprint (SHA1):
        FA:0D:67:B9:A9:34:68:34:90:5D:BC:80:DE:60:96:E4:DE:12:CF:11


Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US"
Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #10197: AnyPolicyWithLevel: Verifying certificate(s)  EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193582 (0x432f9bee)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:37:17 2012
            Not After : Tue Nov 28 00:37:17 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f9:3e:20:78:6f:d2:42:0e:c8:b7:d3:26:46:5b:e5:0b:
                    ba:cd:33:62:59:78:ba:25:7b:1e:68:16:6b:c8:8e:b5:
                    4a:65:c4:d7:6f:51:14:35:4b:88:86:6a:cc:eb:46:e3:
                    00:7d:22:ac:57:17:ba:0a:cb:60:33:51:ac:60:27:10:
                    ea:12:17:7e:2c:b1:24:c5:5c:3c:9f:fc:b2:6b:33:2e:
                    a9:db:1a:e2:18:a9:07:75:a4:ea:49:51:61:87:c2:a9:
                    92:c9:25:4f:c7:0b:bf:ee:06:64:63:26:cf:96:e0:26:
                    a9:65:39:c5:bc:18:8d:14:56:50:3d:91:c5:8e:4c:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b6:03:91:37:77:74:fe:47:58:f1:7a:22:0a:c9:18:8b:
        7c:9a:98:b5:0f:6d:29:43:c3:29:05:6f:78:47:d4:e2:
        a4:e7:61:8a:b5:22:5c:33:39:7a:1e:7a:38:bb:d1:05:
        bb:e0:d4:1f:94:9e:20:02:65:e1:95:c8:aa:22:f6:59:
        88:2c:40:db:87:87:29:8a:43:3c:c2:52:3c:04:83:3b:
        fb:04:85:5c:55:d6:bf:58:ae:18:2c:e6:10:3b:34:8b:
        99:60:de:1b:72:3c:d6:bd:ab:16:9a:42:ae:66:ac:31:
        a1:95:1e:85:74:03:88:51:ce:df:cb:2b:47:7e:fc:dc
    Fingerprint (MD5):
        85:69:63:7E:40:E8:7D:F1:B6:A3:A1:09:A7:C0:EA:BE
    Fingerprint (SHA1):
        FA:0D:67:B9:A9:34:68:34:90:5D:BC:80:DE:60:96:E4:DE:12:CF:11


Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US"
Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #10198: AnyPolicyWithLevel: Verifying certificate(s)  EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193582 (0x432f9bee)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Validity:
            Not Before: Wed Nov 28 00:37:17 2012
            Not After : Tue Nov 28 00:37:17 2062
        Subject: "CN=RootCA ROOT CA,O=RootCA,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    f9:3e:20:78:6f:d2:42:0e:c8:b7:d3:26:46:5b:e5:0b:
                    ba:cd:33:62:59:78:ba:25:7b:1e:68:16:6b:c8:8e:b5:
                    4a:65:c4:d7:6f:51:14:35:4b:88:86:6a:cc:eb:46:e3:
                    00:7d:22:ac:57:17:ba:0a:cb:60:33:51:ac:60:27:10:
                    ea:12:17:7e:2c:b1:24:c5:5c:3c:9f:fc:b2:6b:33:2e:
                    a9:db:1a:e2:18:a9:07:75:a4:ea:49:51:61:87:c2:a9:
                    92:c9:25:4f:c7:0b:bf:ee:06:64:63:26:cf:96:e0:26:
                    a9:65:39:c5:bc:18:8d:14:56:50:3d:91:c5:8e:4c:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b6:03:91:37:77:74:fe:47:58:f1:7a:22:0a:c9:18:8b:
        7c:9a:98:b5:0f:6d:29:43:c3:29:05:6f:78:47:d4:e2:
        a4:e7:61:8a:b5:22:5c:33:39:7a:1e:7a:38:bb:d1:05:
        bb:e0:d4:1f:94:9e:20:02:65:e1:95:c8:aa:22:f6:59:
        88:2c:40:db:87:87:29:8a:43:3c:c2:52:3c:04:83:3b:
        fb:04:85:5c:55:d6:bf:58:ae:18:2c:e6:10:3b:34:8b:
        99:60:de:1b:72:3c:d6:bd:ab:16:9a:42:ae:66:ac:31:
        a1:95:1e:85:74:03:88:51:ce:df:cb:2b:47:7e:fc:dc
    Fingerprint (MD5):
        85:69:63:7E:40:E8:7D:F1:B6:A3:A1:09:A7:C0:EA:BE
    Fingerprint (SHA1):
        FA:0D:67:B9:A9:34:68:34:90:5D:BC:80:DE:60:96:E4:DE:12:CF:11


Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US"
Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US"
Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US"
Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US"
Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US"
Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US"
Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US"
Returned value is 0, expected result is pass
chains.sh: #10199: AnyPolicyWithLevel: Verifying certificate(s)  EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der
vfychain -d AllDB -pp -vv     -o OID.1.0  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der  -t RootCA.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10200: AnyPolicyWithLevel: Verifying certificate(s)  EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags  -d AllDB    -o OID.1.0  -t RootCA.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #10201: explicitPolicy: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193612 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10202: explicitPolicy: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #10203: explicitPolicy: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB nonEVCADB
certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd
chains.sh: #10204: explicitPolicy: Creating DB nonEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request nonEVCAReq.der
certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US"  -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o nonEVCAReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10205: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der  - PASSED
chains.sh: Creating certficate nonEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1127193613   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10206: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database
certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der
chains.sh: #10207: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database  - PASSED
chains.sh: Creating DB EVCADB
certutil -N -d EVCADB -f EVCADB/dbpasswd
chains.sh: #10208: explicitPolicy: Creating DB EVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request EVCAReq.der
certutil -s "CN=EVCA Intermediate, O=EVCA, C=US"  -R -2 -d EVCADB -f EVCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EVCAReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10209: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der  - PASSED
chains.sh: Creating certficate EVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1127193614   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10210: explicitPolicy: Creating certficate EVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate EVCARoot.der to EVCADB database
certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der
chains.sh: #10211: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database  - PASSED
chains.sh: Creating DB otherEVCADB
certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd
chains.sh: #10212: explicitPolicy: Creating DB otherEVCADB  - PASSED
chains.sh: Creating Intermediate certifiate request otherEVCAReq.der
certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US"  -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o otherEVCAReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10213: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der  - PASSED
chains.sh: Creating certficate otherEVCARoot.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1127193615   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10214: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root  - PASSED
chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database
certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der
chains.sh: #10215: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database  - PASSED
chains.sh: Creating DB validEVDB
certutil -N -d validEVDB -f validEVDB/dbpasswd
chains.sh: #10216: explicitPolicy: Creating DB validEVDB  - PASSED
chains.sh: Creating EE certifiate request validEVReq.der
certutil -s "CN=validEV EE, O=validEV, C=US"  -R  -d validEVDB -f validEVDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o validEVReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10217: explicitPolicy: Creating EE certifiate request validEVReq.der  - PASSED
chains.sh: Creating certficate validEVEVCA.der signed by EVCA
certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1127193616   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10218: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA  - PASSED
chains.sh: Importing certificate validEVEVCA.der to validEVDB database
certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der
chains.sh: #10219: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database  - PASSED
chains.sh: Creating DB invalidEVDB
certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd
chains.sh: #10220: explicitPolicy: Creating DB invalidEVDB  - PASSED
chains.sh: Creating EE certifiate request invalidEVReq.der
certutil -s "CN=invalidEV EE, O=invalidEV, C=US"  -R  -d invalidEVDB -f invalidEVDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o invalidEVReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10221: explicitPolicy: Creating EE certifiate request invalidEVReq.der  - PASSED
chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA
certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1127193617   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10222: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA  - PASSED
chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database
certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der
chains.sh: #10223: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database  - PASSED
chains.sh: Creating DB wrongEVOIDDB
certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd
chains.sh: #10224: explicitPolicy: Creating DB wrongEVOIDDB  - PASSED
chains.sh: Creating EE certifiate request wrongEVOIDReq.der
certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US"  -R  -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o wrongEVOIDReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10225: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der  - PASSED
chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA
certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1127193618   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10226: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA  - PASSED
chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database
certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der
chains.sh: #10227: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #10228: explicitPolicy: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  validEVEVCA.der EVCARoot.der Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193612 (0x432f9c0c)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:38:31 2012
            Not After : Tue Nov 28 00:38:31 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ef:ec:99:dc:2e:9a:b5:c6:23:f6:7e:b5:fb:58:c4:39:
                    c0:3c:af:62:17:92:79:83:b9:e6:c7:ef:50:54:73:47:
                    26:0f:5b:ad:11:4e:ea:70:ab:17:bf:1c:46:e3:21:c9:
                    91:30:71:d6:69:29:8c:58:74:44:77:0c:27:42:22:1b:
                    51:4d:d5:46:2d:c5:e4:3b:4e:8c:7b:72:ff:a2:6e:bf:
                    c1:d7:59:dc:03:af:d7:7b:cd:81:fe:74:52:81:15:59:
                    24:79:20:29:37:f9:4a:53:c2:4e:ce:28:ce:16:57:63:
                    41:83:a1:49:29:f8:d4:64:d3:e1:f5:1d:54:6d:64:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        45:89:e2:31:8f:5e:6f:c9:a0:ac:2e:cb:b4:a5:c3:ae:
        ba:d1:c1:db:4f:41:48:bf:1c:89:42:e2:8c:4a:f4:35:
        e8:35:71:8b:3c:6d:69:08:2d:e4:55:ac:95:09:f9:af:
        24:39:e1:3a:7b:98:85:41:9e:cd:b0:dd:98:99:c2:84:
        d9:6b:4a:ce:73:78:53:17:10:98:94:02:e4:07:e7:30:
        f0:80:0f:18:13:a7:bd:50:eb:bb:71:00:24:1e:e5:66:
        53:4c:b8:a4:19:ff:08:77:e8:5c:46:fd:4f:d7:48:b7:
        37:33:53:c3:8b:b6:d4:5f:4c:19:7c:df:2a:f4:c3:db
    Fingerprint (MD5):
        A1:4A:3A:D7:30:AA:FE:A1:5F:47:07:12:86:7C:17:DC
    Fingerprint (SHA1):
        78:09:82:67:A1:9A:69:48:42:A9:FB:6C:11:79:06:65:58:77:36:84


Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #10229: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10230: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der
vfychain -d AllDB -pp -vv     -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10231: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags  -d AllDB    -o OID.1.0  -t Root.der - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #10232: explicitPolicy: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  validEVEVCA.der EVCARoot.der 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193612 (0x432f9c0c)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:38:31 2012
            Not After : Tue Nov 28 00:38:31 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ef:ec:99:dc:2e:9a:b5:c6:23:f6:7e:b5:fb:58:c4:39:
                    c0:3c:af:62:17:92:79:83:b9:e6:c7:ef:50:54:73:47:
                    26:0f:5b:ad:11:4e:ea:70:ab:17:bf:1c:46:e3:21:c9:
                    91:30:71:d6:69:29:8c:58:74:44:77:0c:27:42:22:1b:
                    51:4d:d5:46:2d:c5:e4:3b:4e:8c:7b:72:ff:a2:6e:bf:
                    c1:d7:59:dc:03:af:d7:7b:cd:81:fe:74:52:81:15:59:
                    24:79:20:29:37:f9:4a:53:c2:4e:ce:28:ce:16:57:63:
                    41:83:a1:49:29:f8:d4:64:d3:e1:f5:1d:54:6d:64:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        45:89:e2:31:8f:5e:6f:c9:a0:ac:2e:cb:b4:a5:c3:ae:
        ba:d1:c1:db:4f:41:48:bf:1c:89:42:e2:8c:4a:f4:35:
        e8:35:71:8b:3c:6d:69:08:2d:e4:55:ac:95:09:f9:af:
        24:39:e1:3a:7b:98:85:41:9e:cd:b0:dd:98:99:c2:84:
        d9:6b:4a:ce:73:78:53:17:10:98:94:02:e4:07:e7:30:
        f0:80:0f:18:13:a7:bd:50:eb:bb:71:00:24:1e:e5:66:
        53:4c:b8:a4:19:ff:08:77:e8:5c:46:fd:4f:d7:48:b7:
        37:33:53:c3:8b:b6:d4:5f:4c:19:7c:df:2a:f4:c3:db
    Fingerprint (MD5):
        A1:4A:3A:D7:30:AA:FE:A1:5F:47:07:12:86:7C:17:DC
    Fingerprint (SHA1):
        78:09:82:67:A1:9A:69:48:42:A9:FB:6C:11:79:06:65:58:77:36:84

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US"
Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US"
Returned value is 0, expected result is pass
chains.sh: #10233: explicitPolicy: Verifying certificate(s)  validEVEVCA.der EVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  invalidEVnonEVCA.der nonEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10234: explicitPolicy: Verifying certificate(s)  invalidEVnonEVCA.der nonEVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags  -d AllDB    -o OID.1.0 
vfychain -d AllDB -pp -vv     -o OID.1.0  wrongEVOIDotherEVCA.der otherEVCARoot.der 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10235: explicitPolicy: Verifying certificate(s)  wrongEVOIDotherEVCA.der otherEVCARoot.der with flags  -d AllDB    -o OID.1.0  - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #10236: Mapping: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193619 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10237: Mapping: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #10238: Mapping: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10239: Mapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10240: Mapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127193620   --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #10241: Mapping: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #10242: Mapping: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #10243: Mapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10244: Mapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127193621   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10245: Mapping: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #10246: Mapping: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #10247: Mapping: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10248: Mapping: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1127193622   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10249: Mapping: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #10250: Mapping: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #10251: Mapping: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #10252: Mapping: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #10253: Mapping: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #10254: Mapping: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193619 (0x432f9c13)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:38:51 2012
            Not After : Tue Nov 28 00:38:51 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b2:34:b5:bd:84:0b:43:a7:1e:24:13:68:34:ae:dd:f7:
                    11:66:b5:25:85:46:fd:72:9c:5c:69:ff:a1:13:1c:dd:
                    b2:31:25:15:47:58:47:ed:e1:e7:94:a0:36:e7:61:43:
                    ab:a6:b3:3f:d5:e7:18:ac:da:a2:ab:cb:2b:4a:c2:6b:
                    62:89:82:2f:1b:01:fa:88:fe:b0:d5:6e:c0:5c:7f:f1:
                    88:93:c0:33:6e:99:f6:79:a6:0b:07:ae:66:93:92:8a:
                    fb:b4:f5:03:04:21:61:84:7a:d5:a7:d1:3c:ad:0b:36:
                    0b:50:d6:53:fa:1b:dc:bf:dc:7e:b6:d9:89:fd:19:8d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        75:f2:50:92:ed:82:3c:d4:a2:72:e8:19:27:75:5b:34:
        eb:d4:2a:8c:fd:f6:57:23:6e:33:a8:0e:d7:0e:1b:35:
        92:84:33:5f:b6:ba:84:52:35:c3:57:5e:8a:66:b4:6e:
        f7:35:94:6c:22:80:06:b7:12:db:42:24:ef:f8:18:84:
        71:f2:84:fe:c5:f9:a3:b5:ce:c2:e0:46:71:79:2c:d3:
        05:74:fb:55:4b:54:c3:50:62:92:f2:91:69:b1:41:af:
        e0:1b:d4:11:a4:6f:d4:64:8c:d8:78:40:ee:ab:15:58:
        71:61:dc:bd:29:fb:79:f7:cf:33:e4:9a:7f:cf:ba:30
    Fingerprint (MD5):
        35:49:BE:D9:69:50:AB:5B:DD:C5:26:67:2B:4C:4A:E3
    Fingerprint (SHA1):
        DF:F0:97:C6:D2:83:60:E9:FA:0E:4E:8D:1D:02:50:2D:64:C6:A9:7F

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10255: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10256: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10257: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193620 (0x432f9c14)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:38:53 2012
            Not After : Tue Nov 28 00:38:53 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    cd:cc:48:09:1f:f4:d8:94:f0:5b:30:64:98:c6:3d:41:
                    2b:2f:c9:58:3c:32:d7:1c:86:eb:24:53:0d:15:c8:a6:
                    c1:9a:ae:50:d3:f2:37:41:24:ac:90:eb:e5:86:e5:b2:
                    7c:20:c7:3b:18:a1:34:42:a8:8b:a6:87:c2:28:83:57:
                    44:a7:a1:b3:95:bf:6d:4a:c8:aa:ca:77:97:84:69:0b:
                    94:75:0b:16:9b:73:09:25:5a:7a:96:a4:b2:bd:53:0e:
                    16:5c:03:f7:ef:f4:d6:e2:f2:1b:2c:73:a0:ee:da:8c:
                    7c:d0:e6:2e:7c:28:8f:f6:2d:e6:86:48:a9:2d:5c:8f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        94:9e:eb:df:50:1b:3e:42:10:fb:98:9e:ba:64:68:a4:
        15:82:9e:7c:71:a9:ff:e9:04:94:44:f8:da:12:a0:ef:
        61:1d:87:6c:0c:99:ff:76:2a:e4:be:61:ee:6e:35:3e:
        82:e8:34:58:42:09:92:50:61:be:d3:5e:d3:5d:13:de:
        4b:0e:5a:8b:45:83:b4:78:0b:6f:b9:57:47:8d:2f:e2:
        42:ca:d2:b3:22:90:a1:7b:82:67:66:41:52:2e:27:9c:
        70:7a:50:90:d2:1f:3a:7b:52:61:a7:1a:92:6b:15:80:
        c9:6d:d2:38:91:11:ed:8e:53:22:23:6a:42:0d:b9:ab
    Fingerprint (MD5):
        B1:3B:2F:E8:B5:17:BC:38:D1:C8:04:1F:4C:5A:8B:AA
    Fingerprint (SHA1):
        5B:DB:32:7D:A0:67:6C:C3:54:1B:B0:82:DE:00:08:AB:B0:04:51:94

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #10258: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA2.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10259: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA2.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193621 (0x432f9c15)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:38:55 2012
            Not After : Tue Nov 28 00:38:55 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ba:b6:51:9f:32:66:d2:db:86:18:45:ea:d8:b0:3a:1e:
                    ee:2f:35:51:46:f5:f0:cd:e8:81:de:89:6f:90:1e:66:
                    72:bb:25:f3:96:91:68:cb:97:d0:3e:c8:10:08:64:f4:
                    9a:c7:89:2f:49:fe:a1:e7:a5:a7:d0:97:25:8d:0a:99:
                    13:da:b8:3c:c4:65:ff:18:6d:c9:80:92:17:f6:f0:48:
                    f6:d4:c6:40:88:34:b1:6c:2a:d4:20:80:92:ef:c7:87:
                    2c:72:b2:2d:96:4e:27:87:6d:09:2c:91:a2:4f:81:e3:
                    d5:b8:b8:dd:6f:b1:d4:d7:5b:c2:6b:b8:a5:93:3d:b9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        8d:7d:42:2b:81:44:38:4f:60:29:7a:5e:d8:05:76:10:
        69:41:83:6d:20:64:1e:28:8d:7a:64:70:89:7f:8c:e3:
        d8:96:63:61:39:a0:26:c8:1c:5f:e6:9e:e0:23:ff:10:
        da:e1:b4:11:e5:d2:a8:41:9a:e3:82:ff:6a:a5:e7:ff:
        52:6f:c0:f0:30:dc:ad:6b:8f:74:ca:a6:c5:b0:32:a7:
        30:68:15:f1:cd:a3:93:16:1e:9a:20:48:63:f2:75:c7:
        dc:81:3f:38:24:33:32:34:d6:b7:ab:08:12:f3:74:16:
        6f:76:ca:c4:40:74:8b:5d:b3:92:e9:1e:55:a6:f0:36
    Fingerprint (MD5):
        0C:1F:78:59:47:9A:A5:93:AC:51:57:B4:F5:A2:5C:5C
    Fingerprint (SHA1):
        8D:9D:FF:1B:91:19:E0:0D:F2:22:26:63:6C:1A:E6:5D:4C:CB:5F:30

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Returned value is 0, expected result is pass
chains.sh: #10260: Mapping: Verifying certificate(s)  UserCA2.der with flags  -d AllDB    -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #10261: Mapping2: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193623 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10262: Mapping2: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #10263: Mapping2: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10264: Mapping2: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10265: Mapping2: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127193624   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10266: Mapping2: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #10267: Mapping2: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #10268: Mapping2: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10269: Mapping2: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127193625   --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
n
n
OID.1.0
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #10270: Mapping2: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #10271: Mapping2: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #10272: Mapping2: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US"  -R -2 -d CA3DB -f CA3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10273: Mapping2: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1127193626   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10274: Mapping2: Creating certficate CA3CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate CA3CA2.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der
chains.sh: #10275: Mapping2: Importing certificate CA3CA2.der to CA3DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #10276: Mapping2: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10277: Mapping2: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1127193627   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10278: Mapping2: Creating certficate UserCA3.der signed by CA3  - PASSED
chains.sh: Importing certificate UserCA3.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der
chains.sh: #10279: Mapping2: Importing certificate UserCA3.der to UserDB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #10280: Mapping2: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #10281: Mapping2: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA1Root.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der
chains.sh: #10282: Mapping2: Importing certificate CA1Root.der to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA1.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der
chains.sh: #10283: Mapping2: Importing certificate CA2CA1.der to AllDB database  - PASSED
chains.sh: Importing certificate CA3CA2.der to AllDB database
certutil -A -n CA3  -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der
chains.sh: #10284: Mapping2: Importing certificate CA3CA2.der to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t Root
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193623 (0x432f9c17)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:39:03 2012
            Not After : Tue Nov 28 00:39:03 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    95:08:66:18:75:c9:ee:8b:a4:75:e7:90:52:06:94:68:
                    65:46:42:3d:6e:04:6e:67:9f:31:c0:ee:cf:6d:7c:82:
                    5d:85:dc:92:57:ee:6c:48:d3:62:47:eb:d6:ab:01:5c:
                    a0:17:10:c7:ca:cf:ec:47:b6:1a:7d:03:22:b3:d6:a6:
                    fc:23:05:93:91:32:33:28:a3:ab:c0:12:83:77:32:da:
                    6a:56:66:b8:7e:75:c6:ac:8e:85:8f:6c:7d:ef:78:94:
                    a8:2c:4c:9c:69:07:e5:9a:0c:86:ad:83:32:ea:f7:ee:
                    ae:97:ef:dd:a6:74:09:8a:a2:ce:fc:31:47:26:6c:87
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        32:d3:bd:77:cf:6f:6c:c4:29:01:30:be:71:25:61:f3:
        d9:23:98:71:31:9b:83:17:7d:af:e5:8c:ae:e9:5d:a8:
        a5:00:2c:c1:75:8f:02:96:75:ea:29:5b:90:6c:00:48:
        ec:d7:a6:bd:e7:e7:d4:ca:00:10:c8:b4:da:18:20:a2:
        e3:d2:64:5b:b3:69:25:72:5a:67:ce:ec:b8:25:3f:06:
        e8:1f:49:6e:9b:e2:c1:e0:d2:98:c9:3e:ee:a4:c9:f8:
        2b:f3:82:fe:17:45:2d:92:01:f8:4a:c3:6f:f7:f0:5f:
        1c:96:b1:40:25:be:c7:4c:68:d9:76:cd:b9:62:19:17
    Fingerprint (MD5):
        DF:7B:25:0E:6A:43:14:F0:B2:03:32:B8:2E:30:D0:78
    Fingerprint (SHA1):
        6A:96:0B:06:FF:BD:84:1C:D0:5D:D5:FC:A0:FC:36:8C:8C:31:47:6F

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10285: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t Root
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t Root
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. Root [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10286: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t Root - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t CA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193624 (0x432f9c18)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:39:05 2012
            Not After : Tue Nov 28 00:39:05 2017
        Subject: "CN=CA1 Intermediate,O=CA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ae:ea:8a:41:d2:30:c0:98:ec:37:1e:48:56:cd:4f:
                    b4:73:ac:0c:e3:4a:f0:7e:14:60:89:cd:c2:98:61:ad:
                    a6:75:74:9f:60:ec:e3:d7:39:d0:ef:94:3b:1b:7d:3e:
                    3d:8f:fc:f5:71:97:02:b5:05:e3:0c:cb:07:50:1d:86:
                    e7:86:54:a0:58:59:7f:d6:6c:91:cd:d8:a2:70:63:a5:
                    d9:c9:6f:e7:b9:7c:99:ba:a7:c2:58:fd:0d:32:83:aa:
                    ff:08:69:41:fb:df:d5:ff:68:f3:98:1a:5b:5d:50:a8:
                    6e:e4:61:ff:08:33:76:5e:d2:2c:04:f4:af:9c:e3:2f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policies
            Data: 
                Policy Name: User Defined Policy OID
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        02:08:d2:03:a7:cd:de:53:45:ca:ab:9b:62:7e:19:08:
        9f:6e:62:f7:da:41:f1:aa:b6:23:28:f1:d5:39:4f:f7:
        d6:01:9e:d6:d8:fd:30:26:1f:80:21:63:c2:86:88:21:
        fa:d5:a3:04:7b:ca:21:6a:0c:b9:1d:ef:ac:d1:91:28:
        f8:67:b4:7c:4d:21:54:0d:42:3d:54:34:8d:6d:2f:1e:
        68:22:96:d0:85:9f:d5:77:07:9c:2b:3f:c0:1b:a7:46:
        fe:0a:9b:47:3b:67:d6:a8:00:79:00:62:a6:4b:79:e6:
        7e:82:f5:12:5c:ae:4f:fd:be:eb:c7:bb:a9:26:22:62
    Fingerprint (MD5):
        AB:1E:EA:77:09:E1:91:D2:EF:D9:7A:A5:5D:BB:8B:F0
    Fingerprint (SHA1):
        2E:5B:AC:EB:A0:20:98:61:5F:A6:F3:5E:DE:48:2E:28:FC:8E:58:99

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #10287: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA1
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t CA1
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. CA1 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10288: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA1 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.0  UserCA3.der  -t CA2
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. CA2 [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10289: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.0  -t CA2 - PASSED
chains.sh: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA2
vfychain -d AllDB -pp -vv     -o OID.1.1  UserCA3.der  -t CA2
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193625 (0x432f9c19)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
        Validity:
            Not Before: Wed Nov 28 00:39:07 2012
            Not After : Tue Nov 28 00:39:07 2017
        Subject: "CN=CA2 Intermediate,O=CA2,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    aa:88:09:32:03:bc:75:5e:9d:01:4d:e1:62:cd:fd:fc:
                    c2:3c:1d:04:3b:45:7a:ad:e1:14:31:c0:06:3a:32:be:
                    6b:58:aa:6a:61:f2:4b:33:90:14:04:87:9b:6a:1f:80:
                    f5:24:c9:f6:75:77:fe:b5:91:37:98:ca:2b:d3:8b:81:
                    4e:e1:34:8e:0b:95:09:ff:d4:0f:b0:e0:cb:61:4e:01:
                    4b:b4:75:9e:62:11:77:fa:21:88:c7:5a:5d:46:f1:2c:
                    06:f4:69:dd:ef:ba:2b:be:ef:b7:c9:99:8b:e0:64:50:
                    dd:54:be:e5:54:90:d2:9c:b4:3f:2d:fb:b9:f0:28:35
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Certificate Policy Mappings
            Data: Sequence {
                Sequence {
                    OID.1.0
                    User Defined Policy OID
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: OID.1.0
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        55:96:4b:cd:c7:8f:f4:fc:73:98:b6:3b:c6:64:59:c7:
        6a:cd:c1:2d:33:6c:bc:18:86:8b:d4:2c:f8:ca:fb:60:
        01:78:52:c4:ab:a7:64:05:e7:c7:d6:61:07:75:20:f5:
        6d:54:5e:bf:fc:38:ee:8a:66:ec:1b:50:59:44:53:23:
        14:03:05:b4:38:4b:54:c2:a9:89:d2:2e:48:7c:b2:40:
        1f:37:66:91:39:bf:e2:58:58:be:f2:72:80:1d:94:37:
        3e:d6:b1:df:fc:ec:16:06:8e:ba:37:72:e9:d9:3e:10:
        fc:d8:fb:0a:09:af:32:24:80:31:af:86:9a:61:b3:82
    Fingerprint (MD5):
        88:49:D8:A7:16:1B:9D:19:F2:96:C4:83:31:A1:EE:BB
    Fingerprint (SHA1):
        09:14:59:78:DC:C0:FC:25:19:A9:7E:EB:FA:68:6F:AD:96:2B:0A:C9

    Certificate Trust Flags:
        SSL Flags:
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #10290: Mapping2: Verifying certificate(s)  UserCA3.der with flags  -d AllDB    -o OID.1.1  -t CA2 - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #10291: AIA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193628 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10292: AIA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #10293: AIA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10294: AIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10295: AIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127193629   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10296: AIA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #10297: AIA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #10298: AIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10299: AIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1127193630   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA1Root-1127193538.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #10300: AIA: Creating certficate CA2CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate CA2CA1.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der
chains.sh: #10301: AIA: Importing certificate CA2CA1.der to CA2DB database  - PASSED
chains.sh: Creating DB UserDB
certutil -N -d UserDB -f UserDB/dbpasswd
chains.sh: #10302: AIA: Creating DB UserDB  - PASSED
chains.sh: Creating EE certifiate request UserReq.der
certutil -s "CN=User EE, O=User, C=US"  -R  -d UserDB -f UserDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o UserReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10303: AIA: Creating EE certifiate request UserReq.der  - PASSED
chains.sh: Creating certficate UserCA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1127193631   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10304: AIA: Creating certficate UserCA2.der signed by CA2  - PASSED
chains.sh: Importing certificate UserCA2.der to UserDB database
certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der
chains.sh: #10305: AIA: Importing certificate UserCA2.der to UserDB database  - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB     -t Root.der
vfychain -d UserDB -pp -vv      UserCA2.der CA2CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA1 Intermediate,O=CA1,C=US
Returned value is 1, expected result is fail
chains.sh: #10306: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB -f    -t Root.der
vfychain -d UserDB -pp -vv  -f    UserCA2.der CA2CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193628 (0x432f9c1c)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:39:19 2012
            Not After : Tue Nov 28 00:39:19 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    b0:33:0f:44:db:b7:3a:43:69:fc:84:63:cf:61:51:be:
                    8a:68:f8:79:99:64:c9:68:a2:ff:38:cd:0d:12:01:b2:
                    fd:e8:2a:47:68:95:b5:2f:27:0b:40:72:d6:db:46:f6:
                    0b:9c:96:f1:2a:6f:4d:78:94:34:f2:df:d5:65:e1:42:
                    f5:b1:d3:d9:3d:8d:22:73:61:a0:0d:50:0a:5e:e7:83:
                    d3:8a:21:81:f4:d8:d8:03:07:f5:d3:82:01:02:d2:dd:
                    4c:e5:e4:86:a0:fb:5b:4d:2e:c4:b1:db:fc:5b:12:42:
                    58:16:f1:0c:7a:9a:59:33:8a:1b:f9:f6:73:b1:5f:b5
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        7d:1b:b2:d8:8b:42:6a:ad:58:bc:5e:5c:e8:f8:56:b8:
        74:2d:d0:64:91:f0:eb:b8:e1:98:55:b6:e3:8a:d5:dd:
        aa:6b:d2:44:bd:64:cf:86:16:96:ef:9c:37:97:71:75:
        7b:f7:51:03:8b:b1:a3:0d:9b:c3:0e:4a:af:4e:30:ff:
        99:f7:19:3e:08:75:f7:08:fc:75:52:43:6a:09:0b:1b:
        d7:2f:56:6b:f3:d3:7a:70:5d:82:22:c3:75:5a:b0:42:
        58:d6:80:16:4a:1a:09:5f:bb:f4:c2:bb:0b:a6:83:d5:
        cb:4e:cd:ba:7d:25:81:b6:4c:2d:8c:a0:d5:43:c0:dc
    Fingerprint (MD5):
        41:94:C0:B5:04:A1:73:A7:15:DF:01:49:CB:6E:F2:99
    Fingerprint (SHA1):
        B0:7F:6F:57:48:01:20:BB:C6:01:37:95:85:1E:94:87:29:2F:2E:11


Certificate 1 Subject: "CN=User EE,O=User,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10307: AIA: Verifying certificate(s)  UserCA2.der CA2CA1.der with flags  -d UserDB -f    -t Root.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #10308: BridgeWithAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193632 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10309: BridgeWithAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #10310: BridgeWithAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #10311: BridgeWithAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193633 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10312: BridgeWithAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #10313: BridgeWithAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #10314: BridgeWithAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o BridgeReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10315: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1127193634 -7 Bridge@Army  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10316: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #10317: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1127193635 -7 Bridge@Navy  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10318: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #10319: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #10320: BridgeWithAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10321: BridgeWithAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10322: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1127193636   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-Bridge-1127193539.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #10323: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #10324: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #10325: BridgeWithAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10326: BridgeWithAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127193637   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10327: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #10328: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #10329: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193632 (0x432f9c20)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 00:39:28 2012
            Not After : Tue Nov 28 00:39:28 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    bd:15:f9:60:23:16:00:db:4e:be:31:5d:d1:6a:79:ca:
                    b1:fe:e8:df:93:bf:6c:18:de:76:4e:16:6f:62:e1:90:
                    eb:28:89:e1:ea:22:bd:82:c8:12:5a:45:4c:74:e1:ec:
                    81:e1:e3:99:18:0e:03:9c:4b:c1:02:26:01:27:1f:1f:
                    5e:df:73:ef:c6:64:a9:cc:3d:a3:fe:a1:a9:05:72:49:
                    5e:96:28:e4:67:43:76:92:86:18:80:c5:b2:02:e7:94:
                    9b:9a:95:1b:ce:27:64:f5:26:7d:1d:43:a1:d7:88:91:
                    5b:74:f9:45:a0:d8:ad:b6:ee:1a:ba:1d:f3:d6:b9:0d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        58:c7:28:50:00:45:b8:ea:2e:05:02:6f:36:9d:b7:2d:
        65:eb:c7:24:27:c3:5c:8b:5e:e8:e3:94:f6:b0:63:1b:
        65:b7:54:24:ea:6a:12:fb:91:35:33:35:a3:fa:d9:f6:
        ce:c4:a0:a4:da:b6:71:2a:49:44:7a:bb:e2:fb:ad:76:
        6d:c5:93:b0:42:08:39:72:ed:24:a2:a8:2e:a1:36:4b:
        fb:93:20:d9:04:b6:1e:f6:a1:1d:41:0b:ed:f7:3f:b4:
        75:61:01:c9:21:d4:0a:96:bb:bd:d3:98:8b:2f:bc:b0:
        9f:9b:f9:63:3e:79:44:f9:9a:9c:aa:55:d3:f3:7c:48
    Fingerprint (MD5):
        E5:53:99:E6:52:7B:FA:2A:24:34:BA:27:F8:D2:A5:95
    Fingerprint (SHA1):
        1C:94:AC:C3:21:02:6C:7F:1D:B4:0E:C4:6A:35:DA:FA:E1:18:21:77


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #10330: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193633 (0x432f9c21)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:39:30 2012
            Not After : Tue Nov 28 00:39:30 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ea:6e:e9:58:5f:f5:44:01:db:fa:d1:e5:37:e9:76:7e:
                    97:a9:fd:10:d3:9c:fc:b9:1e:70:8b:9e:e7:7a:b1:a7:
                    e9:06:17:68:ff:3a:6b:1b:e4:3e:ad:51:06:4f:45:3d:
                    63:10:af:11:fa:ba:91:3d:fb:59:5b:79:d8:90:77:e3:
                    04:9a:b6:00:ec:15:fa:9d:ef:f9:f4:2f:06:52:67:4a:
                    0d:41:59:ef:a9:79:80:e2:2b:b9:54:fa:50:23:96:a0:
                    b4:2f:c8:d5:fc:3c:5c:25:56:ad:bc:cd:16:4f:47:82:
                    1b:f7:a8:4c:3c:97:64:64:01:93:e9:9e:eb:65:a8:3b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        51:f3:0e:ec:6b:a3:24:6f:d3:39:d2:fa:55:bb:44:08:
        fc:47:d5:b8:ec:ac:be:dd:19:07:ce:b6:33:2d:14:9c:
        c7:fc:94:a6:f6:ca:7b:e6:68:78:75:78:c5:fb:d7:27:
        da:6d:68:2e:93:9e:0e:77:4e:ef:05:1e:6c:cc:77:0c:
        a8:f3:db:c2:17:06:fa:bc:a2:a1:9c:ba:3d:d3:36:09:
        a8:99:e1:dd:74:36:b0:10:40:1f:f6:98:3e:92:c3:31:
        98:58:ba:65:8b:6b:28:e7:e1:78:ee:9a:a3:dd:8a:fb:
        49:a4:45:43:96:b5:eb:a6:cb:03:eb:fc:06:dd:2c:b4
    Fingerprint (MD5):
        57:56:B8:C8:CE:2F:9D:13:28:EB:50:F0:7B:5E:75:6A
    Fingerprint (SHA1):
        89:93:5B:94:74:EC:8E:84:98:76:57:15:DD:E0:20:57:28:41:CF:EE


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #10331: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193633 (0x432f9c21)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:39:30 2012
            Not After : Tue Nov 28 00:39:30 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ea:6e:e9:58:5f:f5:44:01:db:fa:d1:e5:37:e9:76:7e:
                    97:a9:fd:10:d3:9c:fc:b9:1e:70:8b:9e:e7:7a:b1:a7:
                    e9:06:17:68:ff:3a:6b:1b:e4:3e:ad:51:06:4f:45:3d:
                    63:10:af:11:fa:ba:91:3d:fb:59:5b:79:d8:90:77:e3:
                    04:9a:b6:00:ec:15:fa:9d:ef:f9:f4:2f:06:52:67:4a:
                    0d:41:59:ef:a9:79:80:e2:2b:b9:54:fa:50:23:96:a0:
                    b4:2f:c8:d5:fc:3c:5c:25:56:ad:bc:cd:16:4f:47:82:
                    1b:f7:a8:4c:3c:97:64:64:01:93:e9:9e:eb:65:a8:3b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        51:f3:0e:ec:6b:a3:24:6f:d3:39:d2:fa:55:bb:44:08:
        fc:47:d5:b8:ec:ac:be:dd:19:07:ce:b6:33:2d:14:9c:
        c7:fc:94:a6:f6:ca:7b:e6:68:78:75:78:c5:fb:d7:27:
        da:6d:68:2e:93:9e:0e:77:4e:ef:05:1e:6c:cc:77:0c:
        a8:f3:db:c2:17:06:fa:bc:a2:a1:9c:ba:3d:d3:36:09:
        a8:99:e1:dd:74:36:b0:10:40:1f:f6:98:3e:92:c3:31:
        98:58:ba:65:8b:6b:28:e7:e1:78:ee:9a:a3:dd:8a:fb:
        49:a4:45:43:96:b5:eb:a6:cb:03:eb:fc:06:dd:2c:b4
    Fingerprint (MD5):
        57:56:B8:C8:CE:2F:9D:13:28:EB:50:F0:7B:5E:75:6A
    Fingerprint (SHA1):
        89:93:5B:94:74:EC:8E:84:98:76:57:15:DD:E0:20:57:28:41:CF:EE


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #10332: BridgeWithAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #10333: BridgeWithHalfAIA: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193638 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10334: BridgeWithHalfAIA: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #10335: BridgeWithHalfAIA: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #10336: BridgeWithHalfAIA: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193639 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10337: BridgeWithHalfAIA: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #10338: BridgeWithHalfAIA: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #10339: BridgeWithHalfAIA: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o BridgeReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10340: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1127193640 -7 Bridge@Army  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10341: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army  - PASSED
chains.sh: Importing certificate BridgeArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der
chains.sh: #10342: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1127193641 -7 Bridge@Navy  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10343: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate BridgeNavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der
chains.sh: #10344: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7
chains.sh: #10345: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10346: BridgeWithHalfAIA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10347: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1127193642   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-Bridge-1127193540.p7
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #10348: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #10349: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #10350: BridgeWithHalfAIA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10351: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127193643   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10352: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #10353: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #10354: BridgeWithHalfAIA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10355: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1127193644   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-BridgeNavy-1127193541.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #10356: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
chains.sh: #10357: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #10358: BridgeWithHalfAIA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10359: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1127193645   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10360: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #10361: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der
vfychain -d EE1DB -pp -vv      EE1CA1.der CA1Bridge.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]:
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=Bridge Bridge,O=Bridge,C=US
Returned value is 1, expected result is fail
chains.sh: #10362: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB     -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193638 (0x432f9c26)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 00:39:39 2012
            Not After : Tue Nov 28 00:39:39 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e4:86:bf:49:ba:dc:9e:fb:aa:fc:e9:1d:50:dc:a4:57:
                    51:75:b0:85:42:a0:14:57:07:ee:f6:ac:12:51:5d:5d:
                    2a:ea:7a:9e:12:51:51:c3:b7:21:2a:a4:40:1e:ac:68:
                    22:24:55:c4:02:57:16:5f:59:af:70:b5:e9:90:66:c3:
                    29:10:fa:66:3a:49:5d:71:68:f8:08:97:79:bc:e4:11:
                    98:af:57:24:27:89:e1:bf:e1:be:91:15:1e:ff:38:0e:
                    cc:14:40:3a:07:1b:80:a3:6a:0e:b8:04:27:7f:e6:23:
                    bc:f7:d2:5d:1f:59:89:4b:5b:1e:24:de:29:7b:5e:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2b:d4:3b:03:5c:05:e5:73:b5:b7:55:64:4d:07:41:
        3f:ab:18:14:43:30:76:16:86:c4:d2:63:48:78:77:64:
        0a:3b:f6:db:d5:82:f5:12:1f:3b:f0:d9:ef:42:12:78:
        3b:02:2a:04:d0:57:90:a3:25:66:87:2b:02:5a:58:61:
        04:17:99:e4:ae:01:95:4e:6b:a4:34:88:6d:1d:d3:97:
        0f:ad:78:a2:6e:e0:58:dd:06:3d:32:49:0e:33:ef:0a:
        4b:ae:bd:ae:90:5f:b1:8f:21:87:04:a5:d4:73:a9:2d:
        02:62:1c:e4:c0:7c:51:4b:d6:74:2d:32:f5:cd:97:f2
    Fingerprint (MD5):
        96:13:BE:86:1A:E7:A5:39:9C:75:C3:32:99:1E:D9:04
    Fingerprint (SHA1):
        4B:3E:E9:CD:F9:0A:64:9C:DC:0C:8D:1F:3A:9B:C5:27:0D:58:94:8E


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #10363: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193639 (0x432f9c27)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:39:41 2012
            Not After : Tue Nov 28 00:39:41 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:47:9e:13:24:69:ae:e2:d6:e7:8c:8d:b4:0f:8f:21:
                    8c:94:54:65:04:d7:25:53:83:5d:b9:a9:3f:e2:8a:7a:
                    e9:e4:fc:af:2d:77:9a:6d:3d:67:3b:76:42:21:8a:b5:
                    ef:e4:1c:1d:48:7f:eb:9e:18:fc:99:62:9f:e5:7d:70:
                    40:98:56:d4:48:8d:61:cb:17:2a:fd:8a:c1:97:21:43:
                    e8:bd:3f:62:fb:1a:c1:79:ea:5f:9f:7d:ad:02:c4:0a:
                    e5:1e:62:90:e3:ef:c3:e7:9d:07:a1:02:ad:3b:11:a4:
                    41:2c:be:46:72:5d:8e:51:1a:06:07:e5:cf:93:98:d9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9e:e9:51:1e:5c:30:59:27:1e:27:05:55:2d:d3:4c:a7:
        73:8c:79:0a:f9:e8:5e:72:2f:89:1e:ba:a6:94:5c:41:
        0e:48:7b:94:44:ef:8c:af:91:39:c3:10:b4:3f:af:b6:
        53:08:88:38:43:e5:28:f2:fd:5b:8f:28:83:0e:d1:8e:
        6c:87:d3:ff:47:66:c5:29:28:f2:da:c4:83:ae:06:c9:
        20:ef:2c:2c:6b:f2:65:83:d7:10:1f:d1:5d:88:ee:e8:
        85:b1:d2:75:c4:ab:8b:cd:c6:a6:f8:74:31:84:cb:44:
        4d:3d:80:e2:61:cb:83:53:f3:a7:eb:05:f3:3d:59:97
    Fingerprint (MD5):
        41:C6:15:F8:88:C8:BE:16:35:A5:15:C8:07:C7:57:C8
    Fingerprint (SHA1):
        BF:FD:1F:04:51:D1:64:FC:82:04:38:80:90:4C:95:76:AF:3E:C4:F9


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #10364: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE1CA1.der CA1Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193639 (0x432f9c27)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:39:41 2012
            Not After : Tue Nov 28 00:39:41 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:47:9e:13:24:69:ae:e2:d6:e7:8c:8d:b4:0f:8f:21:
                    8c:94:54:65:04:d7:25:53:83:5d:b9:a9:3f:e2:8a:7a:
                    e9:e4:fc:af:2d:77:9a:6d:3d:67:3b:76:42:21:8a:b5:
                    ef:e4:1c:1d:48:7f:eb:9e:18:fc:99:62:9f:e5:7d:70:
                    40:98:56:d4:48:8d:61:cb:17:2a:fd:8a:c1:97:21:43:
                    e8:bd:3f:62:fb:1a:c1:79:ea:5f:9f:7d:ad:02:c4:0a:
                    e5:1e:62:90:e3:ef:c3:e7:9d:07:a1:02:ad:3b:11:a4:
                    41:2c:be:46:72:5d:8e:51:1a:06:07:e5:cf:93:98:d9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9e:e9:51:1e:5c:30:59:27:1e:27:05:55:2d:d3:4c:a7:
        73:8c:79:0a:f9:e8:5e:72:2f:89:1e:ba:a6:94:5c:41:
        0e:48:7b:94:44:ef:8c:af:91:39:c3:10:b4:3f:af:b6:
        53:08:88:38:43:e5:28:f2:fd:5b:8f:28:83:0e:d1:8e:
        6c:87:d3:ff:47:66:c5:29:28:f2:da:c4:83:ae:06:c9:
        20:ef:2c:2c:6b:f2:65:83:d7:10:1f:d1:5d:88:ee:e8:
        85:b1:d2:75:c4:ab:8b:cd:c6:a6:f8:74:31:84:cb:44:
        4d:3d:80:e2:61:cb:83:53:f3:a7:eb:05:f3:3d:59:97
    Fingerprint (MD5):
        41:C6:15:F8:88:C8:BE:16:35:A5:15:C8:07:C7:57:C8
    Fingerprint (SHA1):
        BF:FD:1F:04:51:D1:64:FC:82:04:38:80:90:4C:95:76:AF:3E:C4:F9


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #10365: BridgeWithHalfAIA: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der BridgeArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. CN=EE2 EE,O=EE2,C=US :
  ERROR -8179: Peer's Certificate issuer is not recognized.
    CN=CA2 Intermediate,O=CA2,C=US
Returned value is 1, expected result is fail
chains.sh: #10366: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193638 (0x432f9c26)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 00:39:39 2012
            Not After : Tue Nov 28 00:39:39 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e4:86:bf:49:ba:dc:9e:fb:aa:fc:e9:1d:50:dc:a4:57:
                    51:75:b0:85:42:a0:14:57:07:ee:f6:ac:12:51:5d:5d:
                    2a:ea:7a:9e:12:51:51:c3:b7:21:2a:a4:40:1e:ac:68:
                    22:24:55:c4:02:57:16:5f:59:af:70:b5:e9:90:66:c3:
                    29:10:fa:66:3a:49:5d:71:68:f8:08:97:79:bc:e4:11:
                    98:af:57:24:27:89:e1:bf:e1:be:91:15:1e:ff:38:0e:
                    cc:14:40:3a:07:1b:80:a3:6a:0e:b8:04:27:7f:e6:23:
                    bc:f7:d2:5d:1f:59:89:4b:5b:1e:24:de:29:7b:5e:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        1e:2b:d4:3b:03:5c:05:e5:73:b5:b7:55:64:4d:07:41:
        3f:ab:18:14:43:30:76:16:86:c4:d2:63:48:78:77:64:
        0a:3b:f6:db:d5:82:f5:12:1f:3b:f0:d9:ef:42:12:78:
        3b:02:2a:04:d0:57:90:a3:25:66:87:2b:02:5a:58:61:
        04:17:99:e4:ae:01:95:4e:6b:a4:34:88:6d:1d:d3:97:
        0f:ad:78:a2:6e:e0:58:dd:06:3d:32:49:0e:33:ef:0a:
        4b:ae:bd:ae:90:5f:b1:8f:21:87:04:a5:d4:73:a9:2d:
        02:62:1c:e4:c0:7c:51:4b:d6:74:2d:32:f5:cd:97:f2
    Fingerprint (MD5):
        96:13:BE:86:1A:E7:A5:39:9C:75:C3:32:99:1E:D9:04
    Fingerprint (SHA1):
        4B:3E:E9:CD:F9:0A:64:9C:DC:0C:8D:1F:3A:9B:C5:27:0D:58:94:8E


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #10367: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193639 (0x432f9c27)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:39:41 2012
            Not After : Tue Nov 28 00:39:41 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:47:9e:13:24:69:ae:e2:d6:e7:8c:8d:b4:0f:8f:21:
                    8c:94:54:65:04:d7:25:53:83:5d:b9:a9:3f:e2:8a:7a:
                    e9:e4:fc:af:2d:77:9a:6d:3d:67:3b:76:42:21:8a:b5:
                    ef:e4:1c:1d:48:7f:eb:9e:18:fc:99:62:9f:e5:7d:70:
                    40:98:56:d4:48:8d:61:cb:17:2a:fd:8a:c1:97:21:43:
                    e8:bd:3f:62:fb:1a:c1:79:ea:5f:9f:7d:ad:02:c4:0a:
                    e5:1e:62:90:e3:ef:c3:e7:9d:07:a1:02:ad:3b:11:a4:
                    41:2c:be:46:72:5d:8e:51:1a:06:07:e5:cf:93:98:d9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9e:e9:51:1e:5c:30:59:27:1e:27:05:55:2d:d3:4c:a7:
        73:8c:79:0a:f9:e8:5e:72:2f:89:1e:ba:a6:94:5c:41:
        0e:48:7b:94:44:ef:8c:af:91:39:c3:10:b4:3f:af:b6:
        53:08:88:38:43:e5:28:f2:fd:5b:8f:28:83:0e:d1:8e:
        6c:87:d3:ff:47:66:c5:29:28:f2:da:c4:83:ae:06:c9:
        20:ef:2c:2c:6b:f2:65:83:d7:10:1f:d1:5d:88:ee:e8:
        85:b1:d2:75:c4:ab:8b:cd:c6:a6:f8:74:31:84:cb:44:
        4d:3d:80:e2:61:cb:83:53:f3:a7:eb:05:f3:3d:59:97
    Fingerprint (MD5):
        41:C6:15:F8:88:C8:BE:16:35:A5:15:C8:07:C7:57:C8
    Fingerprint (SHA1):
        BF:FD:1F:04:51:D1:64:FC:82:04:38:80:90:4C:95:76:AF:3E:C4:F9


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #10368: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der
vfychain -d EE1DB -pp -vv  -f    EE2CA2.der CA2Bridge.der BridgeArmy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193639 (0x432f9c27)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:39:41 2012
            Not After : Tue Nov 28 00:39:41 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c2:47:9e:13:24:69:ae:e2:d6:e7:8c:8d:b4:0f:8f:21:
                    8c:94:54:65:04:d7:25:53:83:5d:b9:a9:3f:e2:8a:7a:
                    e9:e4:fc:af:2d:77:9a:6d:3d:67:3b:76:42:21:8a:b5:
                    ef:e4:1c:1d:48:7f:eb:9e:18:fc:99:62:9f:e5:7d:70:
                    40:98:56:d4:48:8d:61:cb:17:2a:fd:8a:c1:97:21:43:
                    e8:bd:3f:62:fb:1a:c1:79:ea:5f:9f:7d:ad:02:c4:0a:
                    e5:1e:62:90:e3:ef:c3:e7:9d:07:a1:02:ad:3b:11:a4:
                    41:2c:be:46:72:5d:8e:51:1a:06:07:e5:cf:93:98:d9
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9e:e9:51:1e:5c:30:59:27:1e:27:05:55:2d:d3:4c:a7:
        73:8c:79:0a:f9:e8:5e:72:2f:89:1e:ba:a6:94:5c:41:
        0e:48:7b:94:44:ef:8c:af:91:39:c3:10:b4:3f:af:b6:
        53:08:88:38:43:e5:28:f2:fd:5b:8f:28:83:0e:d1:8e:
        6c:87:d3:ff:47:66:c5:29:28:f2:da:c4:83:ae:06:c9:
        20:ef:2c:2c:6b:f2:65:83:d7:10:1f:d1:5d:88:ee:e8:
        85:b1:d2:75:c4:ab:8b:cd:c6:a6:f8:74:31:84:cb:44:
        4d:3d:80:e2:61:cb:83:53:f3:a7:eb:05:f3:3d:59:97
    Fingerprint (MD5):
        41:C6:15:F8:88:C8:BE:16:35:A5:15:C8:07:C7:57:C8
    Fingerprint (SHA1):
        BF:FD:1F:04:51:D1:64:FC:82:04:38:80:90:4C:95:76:AF:3E:C4:F9


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Returned value is 0, expected result is pass
chains.sh: #10369: BridgeWithHalfAIA: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeArmy.der with flags  -d EE1DB -f    -t Navy.der - PASSED
chains.sh: Creating DB ArmyDB
certutil -N -d ArmyDB -f ArmyDB/dbpasswd
chains.sh: #10370: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB  - PASSED
chains.sh: Creating Root CA Army
certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army  -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193646 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10371: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army  - PASSED
chains.sh: Exporting Root CA Army.der
certutil -L -d ArmyDB -r -n Army -o Army.der
chains.sh: #10372: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der  - PASSED
chains.sh: Creating DB NavyDB
certutil -N -d NavyDB -f NavyDB/dbpasswd
chains.sh: #10373: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB  - PASSED
chains.sh: Creating Root CA Navy
certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy  -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193647 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10374: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy  - PASSED
chains.sh: Exporting Root CA Navy.der
certutil -L -d NavyDB -r -n Navy -o Navy.der
chains.sh: #10375: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der  - PASSED
chains.sh: Creating DB CAArmyDB
certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd
chains.sh: #10376: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CAArmyReq.der
certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US"  -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CAArmyReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10377: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der  - PASSED
chains.sh: Creating certficate CAArmyArmy.der signed by Army
certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1127193648   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10378: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army  - PASSED
chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database
certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der
chains.sh: #10379: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database  - PASSED
chains.sh: Creating DB CANavyDB
certutil -N -d CANavyDB -f CANavyDB/dbpasswd
chains.sh: #10380: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB  - PASSED
chains.sh: Creating Intermediate certifiate request CANavyReq.der
certutil -s "CN=CANavy Intermediate, O=CANavy, C=US"  -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CANavyReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10381: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der  - PASSED
chains.sh: Creating certficate CANavyNavy.der signed by Navy
certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1127193649   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10382: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy  - PASSED
chains.sh: Importing certificate CANavyNavy.der to CANavyDB database
certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der
chains.sh: #10383: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database  - PASSED
chains.sh: Creating DB BridgeDB
certutil -N -d BridgeDB -f BridgeDB/dbpasswd
chains.sh: #10384: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB  - PASSED
chains.sh: Creating Bridge certifiate request BridgeReq.der
certutil -s "CN=Bridge Bridge, O=Bridge, C=US"  -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o BridgeReq.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10385: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der  - PASSED
chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy
certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1127193650 -7 Bridge@CAArmy  --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.1.1
1

n
n
n
OID.1.1
OID.2.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #10386: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy  - PASSED
chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der
chains.sh: #10387: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database  - PASSED
chains.sh: Creating certficate BridgeCANavy.der signed by CANavy
certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1127193651 -7 Bridge@CANavy  --extCP --extPM < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.2.0
1

n
y
OID.2.1
1

n
n
n
OID.2.1
OID.1.1
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N]
Is this a critical extension [y/N]?
chains.sh: #10388: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy  - PASSED
chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database
certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der
chains.sh: #10389: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database  - PASSED
chains.sh: Generating PKCS7 package from BridgeDB database
cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7
chains.sh: #10390: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10391: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10392: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1127193652   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.1
1

n
y
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10393: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA1Bridge.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der
chains.sh: #10394: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #10395: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10396: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Bridge.der signed by Bridge
certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1127193653   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.1.0
1

n
y
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.1.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10397: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge  - PASSED
chains.sh: Importing certificate CA2Bridge.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der
chains.sh: #10398: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #10399: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10400: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127193654   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.2.1
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.1
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10401: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #10402: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #10403: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10404: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1127193655   --extCP < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
OID.2.0
1

n
n
n

===
Enter a CertPolicy Object Identifier (dotted decimal format)
or "any" for AnyPolicy: > Choose the type of qualifier for policy: OID.2.0
1 - CPS Pointer qualifier
2 - User notice qualifier
Any other number to finish
Choice:  > Enter CPS pointer URI:  > Enter another policy qualifier [y/N]
Enter another PolicyInformation field [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10405: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #10406: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der
vfychain  -pp -vv     -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10407: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der
vfychain  -pp -vv     -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193646 (0x432f9c2e)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Army ROOT CA,O=Army,C=US"
        Validity:
            Not Before: Wed Nov 28 00:39:54 2012
            Not After : Tue Nov 28 00:39:54 2062
        Subject: "CN=Army ROOT CA,O=Army,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c9:23:df:6e:d5:e2:05:e5:0e:c3:af:9c:c6:3a:a8:af:
                    a1:68:d8:92:ca:49:56:c8:ed:c1:6d:ce:1a:0e:85:38:
                    20:25:8f:49:f3:db:49:91:f5:5e:ec:3c:67:10:b9:36:
                    2f:0a:d2:c7:7f:40:21:2f:dc:71:9a:3f:cf:f7:3d:67:
                    70:2c:99:11:df:e7:6b:9e:52:19:73:dd:02:f8:7d:66:
                    1a:33:66:2a:aa:c9:d0:bc:f7:ae:c6:10:44:1c:50:61:
                    12:51:16:60:ee:a2:bb:02:76:fa:7e:53:be:d6:15:99:
                    75:d4:ae:55:28:46:4f:75:9c:2a:cc:dd:20:fb:ce:bd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        31:4a:2e:84:a0:9d:f7:ed:3f:06:a2:e9:03:e9:70:06:
        60:78:f2:3e:78:9a:ba:3b:e0:07:0b:28:1e:cd:0b:8f:
        41:d2:bb:a5:ef:9f:f5:60:eb:b3:a5:d4:a2:ad:9a:92:
        e5:0e:bd:3e:37:00:9b:48:86:9f:af:ff:09:5e:07:8a:
        6f:d8:d8:06:ea:ba:b7:f6:4f:c3:fe:6b:cd:28:eb:08:
        cf:f2:5c:75:0b:f9:fb:a0:aa:a1:55:47:f5:99:a1:59:
        a4:5e:ca:1f:1d:dd:11:1e:4f:ef:07:a9:96:38:32:3b:
        08:30:19:0e:e5:ad:40:d0:da:ba:e1:02:17:91:ed:9f
    Fingerprint (MD5):
        8C:D3:ED:9E:B9:FD:D1:5F:63:CB:7D:67:5A:2D:97:86
    Fingerprint (SHA1):
        BE:DB:3C:E5:FA:A1:CB:60:B2:88:F4:0E:9D:3D:D6:90:7A:EF:41:4D


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US"
Returned value is 0, expected result is pass
chains.sh: #10408: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der
vfychain  -pp -vv     -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10409: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der
vfychain  -pp -vv     -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10410: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der
vfychain  -pp -vv     -o OID.1.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10411: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der
vfychain  -pp -vv     -o OID.1.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10412: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der
vfychain  -pp -vv     -o OID.2.0  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10413: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der
vfychain  -pp -vv     -o OID.2.1  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10414: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der
vfychain  -pp -vv     -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10415: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der
vfychain  -pp -vv     -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10416: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.1.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der
vfychain  -pp -vv     -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193647 (0x432f9c2f)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Navy ROOT CA,O=Navy,C=US"
        Validity:
            Not Before: Wed Nov 28 00:39:56 2012
            Not After : Tue Nov 28 00:39:56 2062
        Subject: "CN=Navy ROOT CA,O=Navy,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    db:45:c8:79:9d:a2:c2:22:94:89:10:d2:90:f0:14:c2:
                    1e:68:e7:00:25:3f:37:17:e5:0d:94:63:8c:2d:27:3d:
                    10:f1:0f:10:b2:3b:7b:7c:4f:e6:2f:1d:bd:27:7a:ac:
                    de:03:cc:fe:df:6b:4a:98:b1:98:05:91:86:1b:a0:21:
                    b8:40:88:f3:b4:01:65:a7:54:c3:eb:82:28:66:29:63:
                    4d:e4:ee:2c:70:f8:80:5f:2b:17:71:03:16:6c:07:aa:
                    9a:76:91:5c:bb:b7:c4:e8:44:f5:ab:af:d6:8c:46:67:
                    ac:f4:69:c7:f4:07:01:d7:45:9e:9c:fc:f7:28:db:1b
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        51:6b:ae:39:4d:a6:0f:79:d0:4e:48:35:b4:de:0b:d1:
        96:4f:26:3d:65:31:91:8a:7d:68:e9:b7:56:03:2f:c5:
        d1:e5:39:8a:ce:4e:57:0e:4c:13:72:e0:08:15:76:4b:
        4f:96:47:dc:e5:44:47:ee:e3:40:e0:13:8a:e6:0e:96:
        9b:47:b9:72:f9:00:a1:31:fe:4b:10:a8:8f:2d:c1:ec:
        fc:4d:e2:ed:df:44:bd:f6:04:51:2f:2c:15:31:34:f0:
        7c:55:e3:85:5a:99:f9:5c:fe:ed:cb:84:d6:56:89:c5:
        ad:f0:34:13:0c:af:bd:79:42:db:7e:46:06:fc:c4:7b
    Fingerprint (MD5):
        FF:BF:E5:FA:49:CC:7F:CF:F5:D2:76:9F:E8:9D:C3:46
    Fingerprint (SHA1):
        D7:6B:AD:5E:E3:19:A4:AB:A0:95:CD:48:8B:BB:0C:18:26:A0:D3:D2


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US"
Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US"
Returned value is 0, expected result is pass
chains.sh: #10417: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.0  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der
vfychain  -pp -vv     -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der  -t Navy.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10418: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags      -o OID.2.1  -t Navy.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der
vfychain  -pp -vv     -o OID.1.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10419: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der
vfychain  -pp -vv     -o OID.1.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10420: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.1.1  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der
vfychain  -pp -vv     -o OID.2.0  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10421: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.0  -t Army.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der
vfychain  -pp -vv     -o OID.2.1  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der  -t Army.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]:
  ERROR -8032: Cert chain fails policy validation
Returned value is 1, expected result is fail
chains.sh: #10422: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s)  EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags      -o OID.2.1  -t Army.der - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #10423: RealCerts: Creating DB AllDB  - PASSED
chains.sh: Importing certificate TestCA.ca.cert to AllDB database
certutil -A -n TestCA.ca  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/TestCA.ca.cert
chains.sh: #10424: RealCerts: Importing certificate TestCA.ca.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser50.cert to AllDB database
certutil -A -n TestUser50  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert
chains.sh: #10425: RealCerts: Importing certificate TestUser50.cert to AllDB database  - PASSED
chains.sh: Importing certificate TestUser51.cert to AllDB database
certutil -A -n TestUser51  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert
chains.sh: #10426: RealCerts: Importing certificate TestUser51.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalRootCA.cert to AllDB database
certutil -A -n PayPalRootCA  -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/PayPalRootCA.cert
chains.sh: #10427: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalICA.cert to AllDB database
certutil -A -n PayPalICA  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/PayPalICA.cert
chains.sh: #10428: RealCerts: Importing certificate PayPalICA.cert to AllDB database  - PASSED
chains.sh: Importing certificate PayPalEE.cert to AllDB database
certutil -A -n PayPalEE  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert
chains.sh: #10429: RealCerts: Importing certificate PayPalEE.cert to AllDB database  - PASSED
chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database
certutil -A -n BrAirWaysBadSig  -t "" -d AllDB -f AllDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert
chains.sh: #10430: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  TestUser50.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/TestUser50.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Mar 19 21:04:25 2008
            Not After : Tue Mar 19 21:04:25 2058
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61:
                    fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82:
                    9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae:
                    c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03:
                    a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0:
                    a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b:
                    2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9:
                    aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e:
        0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18:
        57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc:
        58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38:
        5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62:
        57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55:
        0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a:
        f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7
    Fingerprint (MD5):
        35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27
    Fingerprint (SHA1):
        52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser50,E=TestUser50@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #10431: RealCerts: Verifying certificate(s)  TestUser50.cert with flags  -d AllDB     - PASSED
chains.sh: Verifying certificate(s)  TestUser51.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/TestUser51.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
            S"
        Validity:
            Not Before: Wed Mar 19 21:04:25 2008
            Not After : Tue Mar 19 21:04:25 2058
        Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
            US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    e6:a7:fb:18:60:23:4e:1f:bf:76:e3:9f:4d:ee:69:61:
                    fa:17:51:d8:fa:ed:9b:5a:8d:77:eb:bd:cf:3a:33:82:
                    9b:ef:08:fb:8f:7e:b9:53:65:b6:9f:e4:a1:e6:d9:ae:
                    c5:66:16:6f:eb:ae:59:e6:e2:ab:af:53:37:67:e2:03:
                    a6:ec:29:e4:2d:65:3f:51:c8:29:44:c0:f5:d8:a5:c0:
                    a3:e8:7c:f5:78:88:1e:39:1b:f9:af:85:c6:45:dc:3b:
                    2c:df:27:4d:c3:36:72:cf:d8:b2:61:58:8f:43:bc:d9:
                    aa:9a:55:96:99:d1:c2:56:42:4a:f8:b1:a3:25:b4:fd
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        b1:93:e9:b7:f6:40:fc:3d:20:5d:b6:e7:bd:a6:5d:0e:
        0c:cf:09:ac:09:70:cc:e1:12:e7:c8:f4:3d:53:8f:18:
        57:b9:c7:5c:60:66:fa:83:e1:82:78:e1:d9:21:66:dc:
        58:e1:03:b4:c3:75:6f:a4:3f:25:73:02:b5:e8:e2:38:
        5c:b1:61:eb:dc:86:15:3e:3c:c7:f6:db:94:b8:08:62:
        57:44:92:fe:5c:15:fb:67:7a:d4:83:22:44:ef:4f:55:
        0b:5b:b9:ec:0b:f3:da:c5:03:f2:39:e9:5b:dc:b9:6a:
        f5:01:9b:02:5f:d5:6f:0d:4d:2b:7a:0d:38:eb:84:d7
    Fingerprint (MD5):
        35:D0:B2:A4:9D:E6:0A:4C:D6:04:28:C9:B5:5F:18:27
    Fingerprint (SHA1):
        52:7C:99:B3:6C:71:6D:F8:22:66:4E:60:D0:08:90:A7:90:94:FB:AC

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=TestUser51,E=TestUser51@bogus.com,O=BOGUS NSS,L=Mo
    untain View,ST=California,C=US"
Returned value is 0, expected result is pass
chains.sh: #10432: RealCerts: Verifying certificate(s)  TestUser51.cert with flags  -d AllDB     - PASSED
chains.sh: Verifying certificate(s)  PayPalEE.cert with flags  -d AllDB    -o OID.2.16.840.1.113733.1.7.23.6 
vfychain -d AllDB -pp -vv     -o OID.2.16.840.1.113733.1.7.23.6  /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/PayPalEE.cert 
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            58:f3:9e:5c:01:2b:19:47:21:a9:8e:e4:ee:e0:f8:bf
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "OU=Class 3 Public Primary Certification Authority,O="VeriSig
            n, Inc.",C=US"
        Validity:
            Not Before: Wed Nov 08 00:00:00 2006
            Not After : Sun Nov 07 23:59:59 2021
        Subject: "CN=VeriSign Class 3 Public Primary Certification Authority 
            - G5,OU="(c) 2006 VeriSign, Inc. - For authorized use only",OU=Ve
            riSign Trust Network,O="VeriSign, Inc.",C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    af:24:08:08:29:7a:35:9e:60:0c:aa:e7:4b:3b:4e:dc:
                    7c:bc:3c:45:1c:bb:2b:e0:fe:29:02:f9:57:08:a3:64:
                    85:15:27:f5:f1:ad:c8:31:89:5d:22:e8:2a:aa:a6:42:
                    b3:8f:f8:b9:55:b7:b1:b7:4b:b3:fe:8f:7e:07:57:ec:
                    ef:43:db:66:62:15:61:cf:60:0d:a4:d8:de:f8:e0:c3:
                    62:08:3d:54:13:eb:49:ca:59:54:85:26:e5:2b:8f:1b:
                    9f:eb:f5:a1:91:c2:33:49:d8:43:63:6a:52:4b:d2:8f:
                    e8:70:51:4d:d1:89:69:7b:c7:70:f6:b3:dc:12:74:db:
                    7b:5d:4b:56:d3:96:bf:15:77:a1:b0:f4:a2:25:f2:af:
                    1c:92:67:18:e5:f4:06:04:ef:90:b9:e4:00:e4:dd:3a:
                    b5:19:ff:02:ba:f4:3c:ee:e0:8b:eb:37:8b:ec:f4:d7:
                    ac:f2:f6:f0:3d:af:dd:75:91:33:19:1d:1c:40:cb:74:
                    24:19:21:93:d9:14:fe:ac:2a:52:c7:8f:d5:04:49:e4:
                    8d:63:47:88:3c:69:83:cb:fe:47:bd:2b:7e:4f:c5:95:
                    ae:0e:9d:d4:d1:43:c0:67:73:e3:14:08:7e:e5:3f:9f:
                    73:b8:33:0a:cf:5d:3f:34:87:96:8a:ee:53:e8:25:15
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: CRL Distribution Points
            Distribution point:
                URI: "http://crl.verisign.com/pca3.crl"

            Name: Certificate Key Usage
            Critical: True
            Usages: Certificate Signing
                    CRL Signing

            Name: OID.1.3.6.1.5.5.7.1.12
            Data: Sequence {
                [1]: {
                    [0]: {
                        Sequence {
                            Sequence {
                                Sequence {
                                    "image/gif"
                                    Sequence {
                                        Sequence {
                                            Sequence {
                                                SHA-1
                                            }
                                            8f:e5:d3:1a:86:ac:8d:8e:6b:c3:cf:
                                            80:6a:d4:48:18:2c:7b:19:2e
                                        }
                                    }
                                    Sequence {
                                        "http://logo.verisign.com/vslogo.gif"
                                    }
                                }
                            }
                        }
                    }
                }
            }

            Name: Certificate Policies
            Data: 
                Policy Name: Certificate Policies AnyPolicy
                    Policy Qualifier Name: PKIX CPS Pointer Qualifier
                    Policy Qualifier Data: "https://www.verisign.com/cps"

            Name: Certificate Subject Key ID
            Data:
                7f:d3:65:a7:c2:dd:ec:bb:f0:30:09:f3:43:39:fa:02:
                af:33:31:33

            Name: Certificate Authority Key Identifier
            Issuer: 
                Directory Name: "OU=Class 3 Public Primary Certification Auth
                    ority,O="VeriSign, Inc.",C=US"
            Serial Number:
                70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bf

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:15:49:5e:6b:26:ce:ee:98:e7:4d:a5:92:3f:75:6a:
        f0:33:0b:fa:09:dc:28:92:ab:8d:6a:31:41:d9:47:31:
        47:46:09:a1:39:05:3e:66:65:19:8b:32:bf:61:2c:1c:
        d5:6a:03:6f:44:dc:3b:af:ef:1b:93:58:d6:bd:ce:d0:
        ed:b6:89:77:51:15:59:32:28:c5:7a:89:8c:da:3e:6d:
        5c:75:ac:86:d4:c7:9e:fd:38:3e:96:73:40:87:34:6a:
        84:4e:31:a8:d2:a2:b9:3c:4e:06:dd:cb:b2:7c:ae:e1:
        d5:9f:1e:74:e5:24:f0:cf:e4:9b:ec:25:ea:cd:ec:f6
    Fingerprint (MD5):
        C8:DE:26:6F:0A:C4:1C:6D:46:9C:CC:AD:0A:C4:D5:1C
    Fingerprint (SHA1):
        87:50:7F:E5:19:BD:E7:A1:19:AE:A3:2F:77:9D:76:30:5D:7A:69:13

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=www.paypal.com,OU=PayPal Production,O="PayPal, Inc
    .",STREET=2211 N 1st St,L=San Jose,ST=California,postalCode=95131-2021,C=
    US,serialNumber=3014267,businessCategory=Private Organization,incorporati
    onState=Delaware,incorporationCountry=US"
Certificate 2 Subject: "CN=VeriSign Class 3 Extended Validation SSL CA,OU=Ter
    ms of use at https://www.verisign.com/rpa (c)06,OU=VeriSign Trust Network
    ,O="VeriSign, Inc.",C=US"
Returned value is 0, expected result is pass
chains.sh: #10433: RealCerts: Verifying certificate(s)  PayPalEE.cert with flags  -d AllDB    -o OID.2.16.840.1.113733.1.7.23.6  - PASSED
chains.sh: Verifying certificate(s)  BrAirWaysBadSig.cert with flags  -d AllDB    
vfychain -d AllDB -pp -vv      /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/BrAirWaysBadSig.cert 
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 0. BrAirWaysBadSig :
  ERROR -8181: Peer's Certificate has expired.
Returned value is 1, expected result is fail
chains.sh: #10434: RealCerts: Verifying certificate(s)  BrAirWaysBadSig.cert with flags  -d AllDB     - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #10435: DSA: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193656 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10436: DSA: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #10437: DSA: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10438: DSA: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10439: DSA: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1127193657   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10440: DSA: Creating certficate CA1Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA1Root.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der
chains.sh: #10441: DSA: Importing certificate CA1Root.der to CA1DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #10442: DSA: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10443: DSA: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1127193658   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10444: DSA: Creating certficate EE1CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE1CA1.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der
chains.sh: #10445: DSA: Importing certificate EE1CA1.der to EE1DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #10446: DSA: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10447: DSA: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1127193659   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10448: DSA: Creating certficate CA2Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA2Root.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der
chains.sh: #10449: DSA: Importing certificate CA2Root.der to CA2DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #10450: DSA: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10451: DSA: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1127193660   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10452: DSA: Creating certficate EE2CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE2CA2.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der
chains.sh: #10453: DSA: Importing certificate EE2CA2.der to EE2DB database  - PASSED
chains.sh: Creating DB CA3DB
certutil -N -d CA3DB -f CA3DB/dbpasswd
chains.sh: #10454: DSA: Creating DB CA3DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA3Req.der
certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10455: DSA: Creating Intermediate certifiate request CA3Req.der  - PASSED
chains.sh: Creating certficate CA3Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1127193661   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10456: DSA: Creating certficate CA3Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA3Root.der to CA3DB database
certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der
chains.sh: #10457: DSA: Importing certificate CA3Root.der to CA3DB database  - PASSED
chains.sh: Creating DB EE3DB
certutil -N -d EE3DB -f EE3DB/dbpasswd
chains.sh: #10458: DSA: Creating DB EE3DB  - PASSED
chains.sh: Creating EE certifiate request EE3Req.der
certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R  -d EE3DB -f EE3DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE3Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10459: DSA: Creating EE certifiate request EE3Req.der  - PASSED
chains.sh: Creating certficate EE3CA3.der signed by CA3
certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1127193662   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10460: DSA: Creating certficate EE3CA3.der signed by CA3  - PASSED
chains.sh: Importing certificate EE3CA3.der to EE3DB database
certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der
chains.sh: #10461: DSA: Importing certificate EE3CA3.der to EE3DB database  - PASSED
chains.sh: Creating DB CA4DB
certutil -N -d CA4DB -f CA4DB/dbpasswd
chains.sh: #10462: DSA: Creating DB CA4DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA4Req.der
certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA4Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10463: DSA: Creating Intermediate certifiate request CA4Req.der  - PASSED
chains.sh: Creating certficate CA4Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1127193663   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10464: DSA: Creating certficate CA4Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA4Root.der to CA4DB database
certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der
chains.sh: #10465: DSA: Importing certificate CA4Root.der to CA4DB database  - PASSED
chains.sh: Creating DB EE4DB
certutil -N -d EE4DB -f EE4DB/dbpasswd
chains.sh: #10466: DSA: Creating DB EE4DB  - PASSED
chains.sh: Creating EE certifiate request EE4Req.der
certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R  -d EE4DB -f EE4DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE4Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10467: DSA: Creating EE certifiate request EE4Req.der  - PASSED
chains.sh: Creating certficate EE4CA4.der signed by CA4
certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1127193664   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10468: DSA: Creating certficate EE4CA4.der signed by CA4  - PASSED
chains.sh: Importing certificate EE4CA4.der to EE4DB database
certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der
chains.sh: #10469: DSA: Importing certificate EE4CA4.der to EE4DB database  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #10470: DSA: Creating DB AllDB  - PASSED
chains.sh: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE1CA1.der CA1Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193656 (0x432f9c38)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:40:20 2012
            Not After : Tue Nov 28 00:40:20 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    4b:70:54:b8:3f:d1:f8:7a:c3:35:fd:c9:66:37:ea:d4:
                    25:3c:93:9d:93:d4:6a:99:67:fe:9d:69:b0:b8:bb:30:
                    e8:d5:0f:03:f5:5f:4b:1d:09:cd:81:c7:92:78:96:00:
                    f3:0b:de:cb:45:25:32:c5:ca:e5:04:39:aa:15:10:98:
                    74:b7:8e:00:c4:24:ea:21:2d:84:23:62:b3:29:c3:4b:
                    84:63:5f:4c:a2:fe:d1:68:8e:df:2b:f0:00:fb:46:0b:
                    8b:61:fc:90:cd:d7:90:af:a6:bc:2a:58:be:31:1b:6a:
                    8b:e7:7f:14:7d:58:2b:d0:37:c3:50:61:91:40:e2:c5
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:15:00:94:35:9d:66:f3:75:07:ed:e3:4c:c2:
        cb:13:24:b6:5d:88:37:48:c0:02:14:4c:67:c4:98:cc:
        f3:1b:3c:13:78:09:14:b5:69:9d:ef:39:39:12:24
    Fingerprint (MD5):
        E0:2A:96:C3:E3:5A:DE:BE:B5:F5:2D:58:30:A4:76:2F
    Fingerprint (SHA1):
        93:89:CE:D0:8D:58:F8:97:78:B3:4F:FE:DF:BA:EA:2F:56:49:1F:0E


Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10471: DSA: Verifying certificate(s)  EE1CA1.der CA1Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE2CA2.der CA2Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193656 (0x432f9c38)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:40:20 2012
            Not After : Tue Nov 28 00:40:20 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    4b:70:54:b8:3f:d1:f8:7a:c3:35:fd:c9:66:37:ea:d4:
                    25:3c:93:9d:93:d4:6a:99:67:fe:9d:69:b0:b8:bb:30:
                    e8:d5:0f:03:f5:5f:4b:1d:09:cd:81:c7:92:78:96:00:
                    f3:0b:de:cb:45:25:32:c5:ca:e5:04:39:aa:15:10:98:
                    74:b7:8e:00:c4:24:ea:21:2d:84:23:62:b3:29:c3:4b:
                    84:63:5f:4c:a2:fe:d1:68:8e:df:2b:f0:00:fb:46:0b:
                    8b:61:fc:90:cd:d7:90:af:a6:bc:2a:58:be:31:1b:6a:
                    8b:e7:7f:14:7d:58:2b:d0:37:c3:50:61:91:40:e2:c5
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:15:00:94:35:9d:66:f3:75:07:ed:e3:4c:c2:
        cb:13:24:b6:5d:88:37:48:c0:02:14:4c:67:c4:98:cc:
        f3:1b:3c:13:78:09:14:b5:69:9d:ef:39:39:12:24
    Fingerprint (MD5):
        E0:2A:96:C3:E3:5A:DE:BE:B5:F5:2D:58:30:A4:76:2F
    Fingerprint (SHA1):
        93:89:CE:D0:8D:58:F8:97:78:B3:4F:FE:DF:BA:EA:2F:56:49:1F:0E


Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US"
Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #10472: DSA: Verifying certificate(s)  EE2CA2.der CA2Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE3CA3.der CA3Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193656 (0x432f9c38)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:40:20 2012
            Not After : Tue Nov 28 00:40:20 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    4b:70:54:b8:3f:d1:f8:7a:c3:35:fd:c9:66:37:ea:d4:
                    25:3c:93:9d:93:d4:6a:99:67:fe:9d:69:b0:b8:bb:30:
                    e8:d5:0f:03:f5:5f:4b:1d:09:cd:81:c7:92:78:96:00:
                    f3:0b:de:cb:45:25:32:c5:ca:e5:04:39:aa:15:10:98:
                    74:b7:8e:00:c4:24:ea:21:2d:84:23:62:b3:29:c3:4b:
                    84:63:5f:4c:a2:fe:d1:68:8e:df:2b:f0:00:fb:46:0b:
                    8b:61:fc:90:cd:d7:90:af:a6:bc:2a:58:be:31:1b:6a:
                    8b:e7:7f:14:7d:58:2b:d0:37:c3:50:61:91:40:e2:c5
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:15:00:94:35:9d:66:f3:75:07:ed:e3:4c:c2:
        cb:13:24:b6:5d:88:37:48:c0:02:14:4c:67:c4:98:cc:
        f3:1b:3c:13:78:09:14:b5:69:9d:ef:39:39:12:24
    Fingerprint (MD5):
        E0:2A:96:C3:E3:5A:DE:BE:B5:F5:2D:58:30:A4:76:2F
    Fingerprint (SHA1):
        93:89:CE:D0:8D:58:F8:97:78:B3:4F:FE:DF:BA:EA:2F:56:49:1F:0E


Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US"
Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #10473: DSA: Verifying certificate(s)  EE3CA3.der CA3Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags  -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv      EE4CA4.der CA4Root.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193656 (0x432f9c38)
        Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:40:20 2012
            Not After : Tue Nov 28 00:40:20 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: ANSI X9.57 DSA Signature
                Args:
                    30:82:01:1e:02:81:81:00:98:ef:3a:ae:70:98:9b:44:
                    db:35:86:c1:b6:c2:47:7c:b4:ff:99:e8:ae:44:f2:eb:
                    c3:be:23:0f:65:d0:4c:04:82:90:a7:9d:4a:c8:93:7f:
                    41:df:f8:80:6b:0b:68:7f:af:e4:a8:b5:b2:99:c3:69:
                    fb:3f:e7:1b:d0:0f:a9:7a:4a:04:bf:50:9e:22:33:b8:
                    89:53:24:10:f9:68:77:ad:af:10:68:b8:d3:68:5d:a3:
                    c3:eb:72:3b:a0:0b:73:65:c5:d1:fa:8c:c0:7d:aa:52:
                    29:34:44:01:bf:12:25:fe:18:0a:c8:3f:c1:60:48:db:
                    ad:93:b6:61:67:d7:a8:2d:02:15:00:b5:b0:84:8b:44:
                    29:f6:33:59:a1:3c:be:d2:7f:35:a1:76:27:03:81:02:
                    81:80:04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:
                    00:04:4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:
                    f9:9c:f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:
                    31:50:82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:
                    da:9e:57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:
                    54:2b:5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:
                    83:87:60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:
                    f4:cb:35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:
                    a5:10
            DSA Public Key:
                Prime:
                    98:ef:3a:ae:70:98:9b:44:db:35:86:c1:b6:c2:47:7c:
                    b4:ff:99:e8:ae:44:f2:eb:c3:be:23:0f:65:d0:4c:04:
                    82:90:a7:9d:4a:c8:93:7f:41:df:f8:80:6b:0b:68:7f:
                    af:e4:a8:b5:b2:99:c3:69:fb:3f:e7:1b:d0:0f:a9:7a:
                    4a:04:bf:50:9e:22:33:b8:89:53:24:10:f9:68:77:ad:
                    af:10:68:b8:d3:68:5d:a3:c3:eb:72:3b:a0:0b:73:65:
                    c5:d1:fa:8c:c0:7d:aa:52:29:34:44:01:bf:12:25:fe:
                    18:0a:c8:3f:c1:60:48:db:ad:93:b6:61:67:d7:a8:2d
                Subprime:
                    b5:b0:84:8b:44:29:f6:33:59:a1:3c:be:d2:7f:35:a1:
                    76:27:03:81
                Base:
                    04:0e:83:69:f1:cd:7d:e5:0c:78:93:d6:49:6f:00:04:
                    4e:0e:6c:37:aa:38:22:47:d2:58:ec:83:12:95:f9:9c:
                    f1:f4:27:ff:d7:99:57:35:c6:64:4c:c0:47:12:31:50:
                    82:3c:2a:07:03:01:ef:30:09:89:82:41:76:71:da:9e:
                    57:8b:76:38:37:5f:a5:cd:32:84:45:8d:4c:17:54:2b:
                    5d:c2:6b:ba:3e:a0:7b:95:d7:00:42:f7:08:b8:83:87:
                    60:e1:e5:f4:1a:54:c2:20:da:38:3a:d1:b6:10:f4:cb:
                    35:da:97:92:87:d6:a5:37:62:b4:93:4a:15:21:a5:10
                PublicValue:
                    4b:70:54:b8:3f:d1:f8:7a:c3:35:fd:c9:66:37:ea:d4:
                    25:3c:93:9d:93:d4:6a:99:67:fe:9d:69:b0:b8:bb:30:
                    e8:d5:0f:03:f5:5f:4b:1d:09:cd:81:c7:92:78:96:00:
                    f3:0b:de:cb:45:25:32:c5:ca:e5:04:39:aa:15:10:98:
                    74:b7:8e:00:c4:24:ea:21:2d:84:23:62:b3:29:c3:4b:
                    84:63:5f:4c:a2:fe:d1:68:8e:df:2b:f0:00:fb:46:0b:
                    8b:61:fc:90:cd:d7:90:af:a6:bc:2a:58:be:31:1b:6a:
                    8b:e7:7f:14:7d:58:2b:d0:37:c3:50:61:91:40:e2:c5
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: ANSI X9.57 DSA Signature with SHA-1 Digest
    Signature:
        30:2d:02:15:00:94:35:9d:66:f3:75:07:ed:e3:4c:c2:
        cb:13:24:b6:5d:88:37:48:c0:02:14:4c:67:c4:98:cc:
        f3:1b:3c:13:78:09:14:b5:69:9d:ef:39:39:12:24
    Fingerprint (MD5):
        E0:2A:96:C3:E3:5A:DE:BE:B5:F5:2D:58:30:A4:76:2F
    Fingerprint (SHA1):
        93:89:CE:D0:8D:58:F8:97:78:B3:4F:FE:DF:BA:EA:2F:56:49:1F:0E


Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US"
Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US"
Returned value is 0, expected result is pass
chains.sh: #10474: DSA: Verifying certificate(s)  EE4CA4.der CA4Root.der with flags  -d AllDB     -t Root.der - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #10475: Revocation: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 10 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10476: Revocation: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #10477: Revocation: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #10478: Revocation: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA0Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10479: Revocation: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10480: Revocation: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
chains.sh: #10481: Revocation: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10482: Revocation: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10483: Revocation: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10484: Revocation: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
chains.sh: #10485: Revocation: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #10486: Revocation: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE11Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10487: Revocation: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10488: Revocation: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
chains.sh: #10489: Revocation: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB EE12DB
certutil -N -d EE12DB -f EE12DB/dbpasswd
chains.sh: #10490: Revocation: Creating DB EE12DB  - PASSED
chains.sh: Creating EE certifiate request EE12Req.der
certutil -s "CN=EE12 EE, O=EE12, C=US"  -R  -d EE12DB -f EE12DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE12Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10491: Revocation: Creating EE certifiate request EE12Req.der  - PASSED
chains.sh: Creating certficate EE12CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10492: Revocation: Creating certficate EE12CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE12CA1.der to EE12DB database
certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der
chains.sh: #10493: Revocation: Importing certificate EE12CA1.der to EE12DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #10494: Revocation: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA2Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10495: Revocation: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10496: Revocation: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
chains.sh: #10497: Revocation: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #10498: Revocation: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE21Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10499: Revocation: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10500: Revocation: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
chains.sh: #10501: Revocation: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20121128004055Z
nextupdate=20131128004055Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Wed Nov 28 00:40:55 2012
    Next Update: Thu Nov 28 00:40:55 2013
    CRL Extensions:
chains.sh: #10502: Revocation: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128004055Z
nextupdate=20131128004055Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 00:40:55 2012
    Next Update: Thu Nov 28 00:40:55 2013
    CRL Extensions:
chains.sh: #10503: Revocation: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128004056Z
nextupdate=20131128004056Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 00:40:56 2012
    Next Update: Thu Nov 28 00:40:56 2013
    CRL Extensions:
chains.sh: #10504: Revocation: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20121128004056Z
nextupdate=20131128004056Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Wed Nov 28 00:40:56 2012
    Next Update: Thu Nov 28 00:40:56 2013
    CRL Extensions:
chains.sh: #10505: Revocation: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 14 issued by CA1
crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128004057Z
addcert 14 20121128004057Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 00:40:57 2012
    Next Update: Thu Nov 28 00:40:56 2013
    Entry 1 (0x1):
        Serial Number: 14 (0xe)
        Revocation Date: Wed Nov 28 00:40:57 2012
    CRL Extensions:
chains.sh: #10506: Revocation: Revoking certificate with SN 14 issued by CA1  - PASSED
chains.sh: Revoking certificate with SN 15 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128004058Z
addcert 15 20121128004058Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 00:40:58 2012
    Next Update: Thu Nov 28 00:40:55 2013
    Entry 1 (0x1):
        Serial Number: 15 (0xf)
        Revocation Date: Wed Nov 28 00:40:58 2012
    CRL Extensions:
chains.sh: #10507: Revocation: Revoking certificate with SN 15 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #10508: Revocation: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #10509: Revocation: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #10510: Revocation: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA0Root.der to AllDB database
certutil -A -n CA0  -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der
chains.sh: #10511: Revocation: Importing certificate CA0Root.der to AllDB database  - PASSED
chains.sh: Importing CRL CA0.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl
chains.sh: #10512: Revocation: Importing CRL CA0.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA1CA0.der to AllDB database
certutil -A -n CA1  -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der
chains.sh: #10513: Revocation: Importing certificate CA1CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA1.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl
chains.sh: #10514: Revocation: Importing CRL CA1.crl to AllDB database  - PASSED
chains.sh: Importing certificate CA2CA0.der to AllDB database
certutil -A -n CA2  -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der
chains.sh: #10515: Revocation: Importing certificate CA2CA0.der to AllDB database  - PASSED
chains.sh: Importing CRL CA2.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl
chains.sh: #10516: Revocation: Importing CRL CA2.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:40:39 2012
            Not After : Tue Nov 28 00:40:39 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c9:15:38:68:b3:70:2b:9f:1f:97:83:02:8e:25:bd:34:
                    a7:43:e7:dc:71:cb:3e:49:07:ac:b7:bf:25:fd:1d:81:
                    6a:8f:e4:10:7a:31:e8:97:ec:fc:3e:f0:1c:90:b5:91:
                    23:ca:3f:24:1b:fe:b1:0e:15:e4:1a:c2:e2:b4:ec:68:
                    e9:92:44:9e:c0:a7:c3:45:af:f3:8b:10:f6:03:8b:c0:
                    9e:a2:57:90:85:fc:fd:2d:c0:f7:b3:e0:5a:b4:1f:40:
                    c8:df:d4:2d:1e:9c:8d:cc:81:b4:37:8e:f5:58:65:d9:
                    81:26:53:14:6a:34:cd:d2:96:7e:f6:97:cd:7f:5e:d7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:6e:f7:5a:7c:9c:b3:c9:5b:d8:b6:e4:24:a0:b7:5e:
        59:e6:8e:19:68:56:fb:05:84:11:13:ba:79:18:5c:4d:
        f5:c7:fa:bf:c9:80:54:84:e6:a4:35:0c:74:5e:08:45:
        85:7e:4d:b5:02:55:85:ae:0b:b9:b8:4f:07:59:66:3f:
        e8:92:32:40:e3:11:2e:8c:c0:c8:0c:8a:de:d2:a0:0f:
        c5:dd:ae:e1:ca:5a:4b:eb:2d:43:d6:1e:cc:f8:c8:e6:
        ad:ca:da:a9:5e:3c:d9:fa:65:81:6d:82:8e:dc:28:44:
        47:0e:0b:5b:ee:f7:f8:12:d0:da:5a:8d:63:bd:1d:6f
    Fingerprint (MD5):
        15:DE:A2:AA:A7:94:E5:9D:B9:69:22:1B:CB:EB:5F:DA
    Fingerprint (SHA1):
        6C:A2:FD:69:C1:C1:1F:BC:BB:34:3D:8C:A6:9F:E3:79:D7:2C:52:7C

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #10517: Revocation: Verifying certificate(s)  EE11CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE12CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -m crl     EE12CA1.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10518: Revocation: Verifying certificate(s)  EE12CA1.der with flags  -g leaf -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der with flags  -g chain -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g chain -m crl     EE11CA1.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 10 (0xa)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:40:39 2012
            Not After : Tue Nov 28 00:40:39 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c9:15:38:68:b3:70:2b:9f:1f:97:83:02:8e:25:bd:34:
                    a7:43:e7:dc:71:cb:3e:49:07:ac:b7:bf:25:fd:1d:81:
                    6a:8f:e4:10:7a:31:e8:97:ec:fc:3e:f0:1c:90:b5:91:
                    23:ca:3f:24:1b:fe:b1:0e:15:e4:1a:c2:e2:b4:ec:68:
                    e9:92:44:9e:c0:a7:c3:45:af:f3:8b:10:f6:03:8b:c0:
                    9e:a2:57:90:85:fc:fd:2d:c0:f7:b3:e0:5a:b4:1f:40:
                    c8:df:d4:2d:1e:9c:8d:cc:81:b4:37:8e:f5:58:65:d9:
                    81:26:53:14:6a:34:cd:d2:96:7e:f6:97:cd:7f:5e:d7
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        9f:6e:f7:5a:7c:9c:b3:c9:5b:d8:b6:e4:24:a0:b7:5e:
        59:e6:8e:19:68:56:fb:05:84:11:13:ba:79:18:5c:4d:
        f5:c7:fa:bf:c9:80:54:84:e6:a4:35:0c:74:5e:08:45:
        85:7e:4d:b5:02:55:85:ae:0b:b9:b8:4f:07:59:66:3f:
        e8:92:32:40:e3:11:2e:8c:c0:c8:0c:8a:de:d2:a0:0f:
        c5:dd:ae:e1:ca:5a:4b:eb:2d:43:d6:1e:cc:f8:c8:e6:
        ad:ca:da:a9:5e:3c:d9:fa:65:81:6d:82:8e:dc:28:44:
        47:0e:0b:5b:ee:f7:f8:12:d0:da:5a:8d:63:bd:1d:6f
    Fingerprint (MD5):
        15:DE:A2:AA:A7:94:E5:9D:B9:69:22:1B:CB:EB:5F:DA
    Fingerprint (SHA1):
        6C:A2:FD:69:C1:C1:1F:BC:BB:34:3D:8C:A6:9F:E3:79:D7:2C:52:7C

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #10519: Revocation: Verifying certificate(s)  EE11CA1.der with flags  -g chain -m crl -d AllDB     -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der with flags  -g chain -m crl -d AllDB     -t Root.der
vfychain -d AllDB -pp -vv  -g chain -m crl     EE21CA2.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10520: Revocation: Verifying certificate(s)  EE21CA2.der with flags  -g chain -m crl -d AllDB     -t Root.der - PASSED
chains.sh: #10521: Test that OCSP server is reachable - PASSED
chains.sh: Creating DB OCSPRootDB
certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd
chains.sh: #10522: OCSP: Creating DB OCSPRootDB  - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRootDB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #10523: OCSP: Importing certificate OCSPRoot.cert to OCSPRootDB database  - PASSED
chains.sh: Creating DB OCSPCA1DB
certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd
chains.sh: #10524: OCSP: Creating DB OCSPCA1DB  - PASSED
chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database
/home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/dist/Linux3.6_x86_64_glibc_PTH_64_DBG.OBJ/bin/pk12util -d OCSPCA1DB -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss
pk12util: PKCS12 IMPORT SUCCESSFUL
chains.sh: #10525: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database  - PASSED
chains.sh: Create CRL for OCSPCA1DB
crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128004108Z
nextupdate=20131128004108Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Wed Nov 28 00:41:08 2012
    Next Update: Thu Nov 28 00:41:08 2013
    CRL Extensions:
chains.sh: #10526: OCSP: Create CRL for OCSPCA1DB  - PASSED
chains.sh: Revoking certificate with SN 3 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128004109Z
addcert 3 20121128004109Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Wed Nov 28 00:41:09 2012
    Next Update: Thu Nov 28 00:41:08 2013
    Entry 1 (0x1):
        Serial Number: 3 (0x3)
        Revocation Date: Wed Nov 28 00:41:09 2012
    CRL Extensions:
chains.sh: #10527: OCSP: Revoking certificate with SN 3 issued by OCSPCA1  - PASSED
chains.sh: Revoking certificate with SN 4 issued by OCSPCA1
crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl
=== Crlutil input data ===
update=20121128004110Z
addcert 4 20121128004110Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
    This Update: Wed Nov 28 00:41:10 2012
    Next Update: Thu Nov 28 00:41:08 2013
    Entry 1 (0x1):
        Serial Number: 4 (0x4)
        Revocation Date: Wed Nov 28 00:41:10 2012
    Entry 2 (0x2):
        Serial Number: 3 (0x3)
        Revocation Date: Wed Nov 28 00:41:09 2012
    CRL Extensions:
chains.sh: #10528: OCSP: Revoking certificate with SN 4 issued by OCSPCA1  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE11.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE11.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10529: OCSP: Verifying certificate(s)  OCSPEE11.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10530: OCSP: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10531: OCSP: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10532: OCSP: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #10533: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10534: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g chain -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g chain -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10535: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g chain -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE31.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA3.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US"
Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US"
Returned value is 0, expected result is pass
chains.sh: #10536: OCSP: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -h requireFreshInfo -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE31.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA3.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10537: OCSP: Verifying certificate(s)  OCSPEE31.cert OCSPCA3.cert with flags  -g leaf -h requireFreshInfo -m ocsp -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s doNotUse -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s doNotUse     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10538: OCSP: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s doNotUse -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s forbidFetching -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s forbidFetching     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE12.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US"
Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
Returned value is 0, expected result is pass
chains.sh: #10539: OCSP: Verifying certificate(s)  OCSPEE12.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s forbidFetching -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s failIfNoInfo     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE15.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8071: The OCSP server experienced an internal error.
Returned value is 1, expected result is fail
chains.sh: #10540: OCSP: Verifying certificate(s)  OCSPEE15.cert OCSPCA1.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot
vfychain -d OCSPRootDB -pp -vv  -g leaf -m ocsp -s failIfNoInfo     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE21.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10541: OCSP: Verifying certificate(s)  OCSPEE21.cert OCSPCA2.cert with flags  -g leaf -m ocsp -s failIfNoInfo -d OCSPRootDB     -t OCSPRoot - PASSED
chains.sh: Verifying certificate(s)  OCSPEE13.cert OCSPCA1.cert with flags  -g leaf -h testLocalInfoFirst -m ocsp -d OCSPCA1DB     -t OCSPCA1
vfychain -d OCSPCA1DB -pp -vv  -g leaf -h testLocalInfoFirst -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE13.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA1.cert  -t OCSPCA1
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1 (0x1)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:46 2012
            Not After : Mon Apr 03 15:38:46 2017
        Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    c1:b0:47:12:51:37:68:7d:39:cb:ee:e3:32:2c:ad:b5:
                    44:2c:72:7f:c8:e9:32:79:d9:7d:b9:69:94:bc:5a:9e:
                    5a:3b:0f:e2:07:e5:b2:76:04:73:32:ee:92:8d:a1:2f:
                    ed:e4:e0:5a:92:28:ca:bb:48:fc:5c:44:dc:9a:c0:3b:
                    88:84:0a:bd:6b:4a:c9:18:37:51:e3:a3:3a:e0:40:5c:
                    53:0d:04:ed:c7:18:34:25:5a:5e:00:f5:0d:29:ef:fa:
                    69:e3:6d:96:e3:1e:5b:8a:4e:3e:77:e7:45:16:81:6f:
                    21:01:2c:8d:b1:fa:57:06:f0:9b:95:1a:c3:0d:25:25
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Basic Constraints
            Critical: True
            Data: Is a CA with no maximum path length.

            Name: Authority Information Access
            Method: PKIX Online Certificate Status Protocol
            Location: 
                URI: "http://ocsp.kuix.de:2600"

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        88:c4:da:b7:3d:84:1d:1c:ca:f8:c1:2e:46:59:c2:33:
        93:64:38:f9:2a:87:32:ca:ec:e0:ef:ff:cc:1f:9d:96:
        a6:42:b0:cd:8f:b3:85:3a:59:64:34:c1:0d:bb:24:c5:
        36:f6:28:93:a0:3b:58:b8:93:87:c5:6e:f2:64:23:b9:
        c4:a9:53:82:bd:0a:12:92:58:90:01:b1:11:a6:65:aa:
        a9:72:94:60:96:38:fd:e3:9e:14:5b:4e:ed:0d:99:e2:
        94:6a:50:84:88:00:1e:14:a7:ed:20:69:95:9b:cb:b7:
        61:11:b8:14:7a:1e:19:3c:bb:38:5b:97:e0:ad:9f:2e
    Fingerprint (MD5):
        6E:22:37:7A:94:F2:07:60:87:6B:9D:CF:64:C9:D9:37
    Fingerprint (SHA1):
        92:63:FD:E1:AA:A4:45:54:F7:E8:B7:5F:92:8F:74:06:3E:96:BA:47

    Certificate Trust Flags:
        SSL Flags:
            User
        Email Flags:
            User
        Object Signing Flags:
            User

Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US"
Returned value is 0, expected result is pass
chains.sh: #10542: OCSP: Verifying certificate(s)  OCSPEE13.cert OCSPCA1.cert with flags  -g leaf -h testLocalInfoFirst -m ocsp -d OCSPCA1DB     -t OCSPCA1 - PASSED
chains.sh: Creating DB OCSPRoot1DB
certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd
chains.sh: #10543: OCSP: Creating DB OCSPRoot1DB  - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRoot1DB database
certutil -A -n OCSPRoot  -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #10544: OCSP: Importing certificate OCSPRoot.cert to OCSPRoot1DB database  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot1DB     -t OCSPRoot
vfychain -d OCSPRoot1DB -pp -vv  -g chain -m ocsp -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE23.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. OCSPRoot [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10545: OCSP: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot1DB     -t OCSPRoot - PASSED
chains.sh: Creating DB OCSPRoot2DB
certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd
chains.sh: #10546: OCSP: Creating DB OCSPRoot2DB  - PASSED
chains.sh: Importing certificate OCSPRoot.cert to OCSPRoot2DB database
certutil -A -n OCSPRoot  -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPRoot.cert
chains.sh: #10547: OCSP: Importing certificate OCSPRoot.cert to OCSPRoot2DB database  - PASSED
chains.sh: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot2DB     -t OCSPRoot
vfychain -d OCSPRoot2DB -pp -vv  -g chain -m ocsp -g leaf -m ocsp     /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPEE23.cert /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/security/nss/tests/libpkix/certs/OCSPCA2.cert  -t OCSPRoot
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 403173846 (0x1807f1d6)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Validity:
            Not Before: Tue Apr 03 15:38:45 2012
            Not After : Mon Apr 03 15:38:45 2062
        Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    a3:ba:e2:4a:07:35:35:5b:82:33:f6:c4:a2:55:4d:f2:
                    45:9f:04:79:0d:a1:9a:03:14:7c:16:4f:65:27:ef:f5:
                    54:77:b2:f6:34:2b:a6:2b:81:dc:d1:59:12:99:c8:ab:
                    f1:20:ee:4b:07:da:e7:c5:e4:fe:1a:a9:f8:6c:0f:86:
                    e8:03:59:e6:7c:83:47:eb:97:e2:12:4f:88:29:44:b5:
                    fa:2b:2c:df:2c:ca:c6:06:70:af:8f:94:d3:b7:50:6b:
                    87:1a:dc:83:ac:f3:3c:b8:48:69:3c:10:37:a9:06:8c:
                    18:e4:d6:03:3b:c1:5d:5f:3b:eb:e6:4d:a9:24:89:7d
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        21:b9:29:4b:3a:1c:cc:5b:86:87:ca:8f:a0:b8:72:98:
        a3:03:49:fb:dd:2f:36:8f:5f:ee:c9:e4:f8:e6:65:3d:
        aa:89:7d:f0:ac:1b:a4:1f:db:b3:9d:f9:1b:ed:7d:1b:
        3d:ec:d7:eb:76:99:4d:fd:4d:28:d1:12:9b:16:7a:35:
        fd:86:1f:36:1d:bd:5e:df:f7:7f:3c:27:28:a4:a1:00:
        30:60:78:f3:fb:5c:74:c8:1d:68:cf:5c:7f:28:eb:61:
        44:1d:2e:9c:be:8d:b9:82:95:19:55:e8:93:9c:f5:ed:
        8d:29:7d:72:74:bf:c0:b9:a8:da:9d:ed:2b:a1:ec:40
    Fingerprint (MD5):
        B6:F2:BD:B0:9A:5A:44:F8:0A:F4:1B:7E:95:31:F6:4D
    Fingerprint (SHA1):
        35:38:60:77:26:C7:1F:A5:AE:AE:16:E2:A5:C4:DD:26:BD:71:EB:99

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted Client CA
        Email Flags:
        Object Signing Flags:

Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US"
Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US"
Returned value is 0, expected result is pass
chains.sh: #10548: OCSP: Verifying certificate(s)  OCSPEE23.cert OCSPCA2.cert with flags  -g chain -m ocsp -g leaf -m ocsp -d OCSPRoot2DB     -t OCSPRoot - PASSED
chains.sh: Creating DB RootDB
certutil -N -d RootDB -f RootDB/dbpasswd
chains.sh: #10549: CRLDP: Creating DB RootDB  - PASSED
chains.sh: Creating Root CA Root
certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root  -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -m 1127193665 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
5
6
9
n
y
-1
n
5
6
7
9
n

===


Generating key.  This may take a few moments...

0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
 > Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
 > Is this a critical extension [y/N]?
chains.sh: #10550: CRLDP: Creating Root CA Root  - PASSED
chains.sh: Exporting Root CA Root.der
certutil -L -d RootDB -r -n Root -o Root.der
chains.sh: #10551: CRLDP: Exporting Root CA Root.der  - PASSED
chains.sh: Creating DB CA0DB
certutil -N -d CA0DB -f CA0DB/dbpasswd
chains.sh: #10552: CRLDP: Creating DB CA0DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA0Req.der
certutil -s "CN=CA0 Intermediate, O=CA0, C=US"  -R -2 -d CA0DB -f CA0DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA0Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
chains.sh: #10553: CRLDP: Creating Intermediate certifiate request CA0Req.der  - PASSED
chains.sh: Creating certficate CA0Root.der signed by Root
certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1127193666   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10554: CRLDP: Creating certficate CA0Root.der signed by Root  - PASSED
chains.sh: Importing certificate CA0Root.der to CA0DB database
certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der
chains.sh: #10555: CRLDP: Importing certificate CA0Root.der to CA0DB database  - PASSED
chains.sh: Creating DB CA1DB
certutil -N -d CA1DB -f CA1DB/dbpasswd
chains.sh: #10556: CRLDP: Creating DB CA1DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA1Req.der
certutil -s "CN=CA1 Intermediate, O=CA1, C=US"  -R -2 -d CA1DB -f CA1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA1Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0-1127193555.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10557: CRLDP: Creating Intermediate certifiate request CA1Req.der  - PASSED
chains.sh: Creating certficate CA1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0Root-1127193542.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #10558: CRLDP: Creating certficate CA1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA1CA0.der to CA1DB database
certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der
chains.sh: #10559: CRLDP: Importing certificate CA1CA0.der to CA1DB database  - PASSED
chains.sh: Creating DB EE11DB
certutil -N -d EE11DB -f EE11DB/dbpasswd
chains.sh: #10560: CRLDP: Creating DB EE11DB  - PASSED
chains.sh: Creating EE certifiate request EE11Req.der
certutil -s "CN=EE11 EE, O=EE11, C=US"  -R  -d EE11DB -f EE11DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE11Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0-1127193555.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10561: CRLDP: Creating EE certifiate request EE11Req.der  - PASSED
chains.sh: Creating certficate EE11CA1.der signed by CA1
certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1127193667   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10562: CRLDP: Creating certficate EE11CA1.der signed by CA1  - PASSED
chains.sh: Importing certificate EE11CA1.der to EE11DB database
certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der
chains.sh: #10563: CRLDP: Importing certificate EE11CA1.der to EE11DB database  - PASSED
chains.sh: Creating DB CA2DB
certutil -N -d CA2DB -f CA2DB/dbpasswd
chains.sh: #10564: CRLDP: Creating DB CA2DB  - PASSED
chains.sh: Creating Intermediate certifiate request CA2Req.der
certutil -s "CN=CA2 Intermediate, O=CA2, C=US"  -R -2 -d CA2DB -f CA2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o CA2Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
y
-1
y
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0-1127193555.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10565: CRLDP: Creating Intermediate certifiate request CA2Req.der  - PASSED
chains.sh: Creating certficate CA2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0Root-1127193543.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #10566: CRLDP: Creating certficate CA2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate CA2CA0.der to CA2DB database
certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der
chains.sh: #10567: CRLDP: Importing certificate CA2CA0.der to CA2DB database  - PASSED
chains.sh: Creating DB EE21DB
certutil -N -d EE21DB -f EE21DB/dbpasswd
chains.sh: #10568: CRLDP: Creating DB EE21DB  - PASSED
chains.sh: Creating EE certifiate request EE21Req.der
certutil -s "CN=EE21 EE, O=EE21, C=US"  -R  -d EE21DB -f EE21DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE21Req.der  < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===


Generating key.  This may take a few moments...

chains.sh: #10569: CRLDP: Creating EE certifiate request EE21Req.der  - PASSED
chains.sh: Creating certficate EE21CA2.der signed by CA2
certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1127193668   < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===

===
chains.sh: #10570: CRLDP: Creating certficate EE21CA2.der signed by CA2  - PASSED
chains.sh: Importing certificate EE21CA2.der to EE21DB database
certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der
chains.sh: #10571: CRLDP: Importing certificate EE21CA2.der to EE21DB database  - PASSED
chains.sh: Creating DB EE1DB
certutil -N -d EE1DB -f EE1DB/dbpasswd
chains.sh: #10572: CRLDP: Creating DB EE1DB  - PASSED
chains.sh: Creating EE certifiate request EE1Req.der
certutil -s "CN=EE1 EE, O=EE1, C=US"  -R  -d EE1DB -f EE1DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE1Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0-1127193555.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10573: CRLDP: Creating EE certifiate request EE1Req.der  - PASSED
chains.sh: Creating certficate EE1CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0Root-1127193544.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #10574: CRLDP: Creating certficate EE1CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE1CA0.der to EE1DB database
certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der
chains.sh: #10575: CRLDP: Importing certificate EE1CA0.der to EE1DB database  - PASSED
chains.sh: Creating DB EE2DB
certutil -N -d EE2DB -f EE2DB/dbpasswd
chains.sh: #10576: CRLDP: Creating DB EE2DB  - PASSED
chains.sh: Creating EE certifiate request EE2Req.der
certutil -s "CN=EE2 EE, O=EE2, C=US"  -R  -d EE2DB -f EE2DB/dbpasswd -z /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/tests_noise -o EE2Req.der  -4 < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0-1127193555.crl
-1
-1
-1
n
n

===


Generating key.  This may take a few moments...

Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice:  > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finishChoice:  > Enter value for the CRL Issuer name:


Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
chains.sh: #10577: CRLDP: Creating EE certifiate request EE2Req.der  - PASSED
chains.sh: Creating certficate EE2CA0.der signed by CA0
certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40   --extAIA < /home/tinderbox/mozilla/security/tinderlight/data/buildnss02_trunk_64_DBG/mozilla/tests_results/security/buildnss02.1/sharedb/cu_data
=== Certutil input data ===
1
7
http://buildnss02.usersys.redhat.com:8553/buildnss02-12297-CA0Root-1127193545.der
0
n
n
===
Enter access method type for Authority Information Access extension:
1 - CA Issuers
2 - OCSP
Anyother number to finish
Choice > 
Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > 
Enter data:

Select one of the following general name type: 
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Add another location to the Authority Information Access extension [y/N]
Is this a critical extension [y/N]?
chains.sh: #10578: CRLDP: Creating certficate EE2CA0.der signed by CA0  - PASSED
chains.sh: Importing certificate EE2CA0.der to EE2DB database
certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der
chains.sh: #10579: CRLDP: Importing certificate EE2CA0.der to EE2DB database  - PASSED
chains.sh: Create CRL for RootDB
crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl
=== Crlutil input data ===
update=20121128004146Z
nextupdate=20131128004146Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=Root ROOT CA,O=Root,C=US"
    This Update: Wed Nov 28 00:41:46 2012
    Next Update: Thu Nov 28 00:41:46 2013
    CRL Extensions:
chains.sh: #10580: CRLDP: Create CRL for RootDB  - PASSED
chains.sh: Create CRL for CA0DB
crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128004146Z
nextupdate=20131128004146Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 00:41:46 2012
    Next Update: Thu Nov 28 00:41:46 2013
    CRL Extensions:
chains.sh: #10581: CRLDP: Create CRL for CA0DB  - PASSED
chains.sh: Create CRL for CA1DB
crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl
=== Crlutil input data ===
update=20121128004147Z
nextupdate=20131128004147Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA1 Intermediate,O=CA1,C=US"
    This Update: Wed Nov 28 00:41:47 2012
    Next Update: Thu Nov 28 00:41:47 2013
    CRL Extensions:
chains.sh: #10582: CRLDP: Create CRL for CA1DB  - PASSED
chains.sh: Create CRL for CA2DB
crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl
=== Crlutil input data ===
update=20121128004147Z
nextupdate=20131128004147Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA2 Intermediate,O=CA2,C=US"
    This Update: Wed Nov 28 00:41:47 2012
    Next Update: Thu Nov 28 00:41:47 2013
    CRL Extensions:
chains.sh: #10583: CRLDP: Create CRL for CA2DB  - PASSED
chains.sh: Revoking certificate with SN 20 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128004148Z
addcert 20 20121128004148Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 00:41:48 2012
    Next Update: Thu Nov 28 00:41:46 2013
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Wed Nov 28 00:41:48 2012
    CRL Extensions:
chains.sh: #10584: CRLDP: Revoking certificate with SN 20 issued by CA0  - PASSED
chains.sh: Revoking certificate with SN 40 issued by CA0
crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl
=== Crlutil input data ===
update=20121128004149Z
addcert 40 20121128004149Z
===
CRL Info:
:
    Version: 2 (0x1)
    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Issuer: "CN=CA0 Intermediate,O=CA0,C=US"
    This Update: Wed Nov 28 00:41:49 2012
    Next Update: Thu Nov 28 00:41:46 2013
    Entry 1 (0x1):
        Serial Number: 20 (0x14)
        Revocation Date: Wed Nov 28 00:41:48 2012
    Entry 2 (0x2):
        Serial Number: 40 (0x28)
        Revocation Date: Wed Nov 28 00:41:49 2012
    CRL Extensions:
chains.sh: #10585: CRLDP: Revoking certificate with SN 40 issued by CA0  - PASSED
chains.sh: Creating DB AllDB
certutil -N -d AllDB -f AllDB/dbpasswd
chains.sh: #10586: CRLDP: Creating DB AllDB  - PASSED
chains.sh: Importing certificate Root.der to AllDB database
certutil -A -n Root  -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der
chains.sh: #10587: CRLDP: Importing certificate Root.der to AllDB database  - PASSED
chains.sh: Importing CRL Root.crl to AllDB database
crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl
chains.sh: #10588: CRLDP: Importing CRL Root.crl to AllDB database  - PASSED
chains.sh: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g chain -h requireFreshInfo -m crl -f    EE11CA1.der CA1CA0.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193665 (0x432f9c41)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:41:24 2012
            Not After : Tue Nov 28 00:41:24 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ab:21:c9:21:70:18:92:e9:c5:f0:e6:c9:2b:ba:71:92:
                    54:24:5b:ca:0b:08:c2:c2:02:c3:19:09:9c:f7:b2:29:
                    6d:1f:8a:2e:36:96:97:72:f1:f6:c2:ad:8c:29:b1:c4:
                    d7:a2:fe:67:b3:51:f3:30:bf:19:44:c4:9f:94:9a:19:
                    6e:83:c8:4f:5b:d2:71:ff:66:6a:08:0b:da:57:0f:9c:
                    9e:a2:a2:34:d7:59:75:f9:f8:49:a3:0a:68:de:bb:51:
                    1d:55:fd:4f:f4:09:ca:c9:e3:6d:39:b0:db:df:ba:11:
                    6b:38:12:42:de:78:e8:19:2c:bc:55:34:77:8f:e2:6f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:e8:6b:4d:22:9e:da:5b:4f:93:0a:de:01:7d:c7:e3:
        cb:62:73:3f:ca:d8:8c:02:63:62:de:b5:69:c7:08:02:
        60:18:08:23:9d:e2:7c:bc:07:4f:07:5a:9c:12:aa:b3:
        f2:5b:d3:2c:d1:75:b5:ac:5f:e8:67:7f:9a:68:9b:9a:
        f4:3e:94:d2:b9:d1:9a:b6:bd:5e:76:c8:32:18:cc:7e:
        ca:b4:50:71:e6:5e:5a:c2:c6:3a:d4:a6:0f:7e:2e:54:
        6d:eb:03:6c:bb:05:2e:c4:35:0c:d2:f7:d7:36:7a:1c:
        28:85:43:5f:ff:11:28:94:8b:d1:4e:18:f9:cb:6e:4d
    Fingerprint (MD5):
        7E:51:AD:E0:DD:39:B2:33:47:41:02:22:3D:7E:51:A9
    Fingerprint (SHA1):
        5E:02:8C:DE:9F:9F:BE:F5:18:02:93:04:8B:9F:43:4C:4D:4B:E9:CD

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US"
Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US"
Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #10589: CRLDP: Verifying certificate(s)  EE11CA1.der CA1CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g chain -h requireFreshInfo -m crl -f    EE21CA2.der CA2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 3. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10590: CRLDP: Verifying certificate(s)  EE21CA2.der CA2CA0.der with flags  -g chain -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE1CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -h requireFreshInfo -m crl -f    EE1CA0.der  -t Root.der
Chain is good!
Root Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1127193665 (0x432f9c41)
        Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
        Issuer: "CN=Root ROOT CA,O=Root,C=US"
        Validity:
            Not Before: Wed Nov 28 00:41:24 2012
            Not After : Tue Nov 28 00:41:24 2062
        Subject: "CN=Root ROOT CA,O=Root,C=US"
        Subject Public Key Info:
            Public Key Algorithm: PKCS #1 RSA Encryption
            RSA Public Key:
                Modulus:
                    ab:21:c9:21:70:18:92:e9:c5:f0:e6:c9:2b:ba:71:92:
                    54:24:5b:ca:0b:08:c2:c2:02:c3:19:09:9c:f7:b2:29:
                    6d:1f:8a:2e:36:96:97:72:f1:f6:c2:ad:8c:29:b1:c4:
                    d7:a2:fe:67:b3:51:f3:30:bf:19:44:c4:9f:94:9a:19:
                    6e:83:c8:4f:5b:d2:71:ff:66:6a:08:0b:da:57:0f:9c:
                    9e:a2:a2:34:d7:59:75:f9:f8:49:a3:0a:68:de:bb:51:
                    1d:55:fd:4f:f4:09:ca:c9:e3:6d:39:b0:db:df:ba:11:
                    6b:38:12:42:de:78:e8:19:2c:bc:55:34:77:8f:e2:6f
                Exponent: 65537 (0x10001)
        Signed Extensions:
            Name: Certificate Type
            Data: <SSL CA,S/MIME CA,ObjectSigning CA>

            Name: Certificate Basic Constraints
            Data: Is a CA with no maximum path length.

            Name: Certificate Key Usage
            Usages: Certificate Signing
                    CRL Signing

    Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption
    Signature:
        43:e8:6b:4d:22:9e:da:5b:4f:93:0a:de:01:7d:c7:e3:
        cb:62:73:3f:ca:d8:8c:02:63:62:de:b5:69:c7:08:02:
        60:18:08:23:9d:e2:7c:bc:07:4f:07:5a:9c:12:aa:b3:
        f2:5b:d3:2c:d1:75:b5:ac:5f:e8:67:7f:9a:68:9b:9a:
        f4:3e:94:d2:b9:d1:9a:b6:bd:5e:76:c8:32:18:cc:7e:
        ca:b4:50:71:e6:5e:5a:c2:c6:3a:d4:a6:0f:7e:2e:54:
        6d:eb:03:6c:bb:05:2e:c4:35:0c:d2:f7:d7:36:7a:1c:
        28:85:43:5f:ff:11:28:94:8b:d1:4e:18:f9:cb:6e:4d
    Fingerprint (MD5):
        7E:51:AD:E0:DD:39:B2:33:47:41:02:22:3D:7E:51:A9
    Fingerprint (SHA1):
        5E:02:8C:DE:9F:9F:BE:F5:18:02:93:04:8B:9F:43:4C:4D:4B:E9:CD

    Certificate Trust Flags:
        SSL Flags:
            Valid CA
            Trusted CA
            Trusted Client CA
        Email Flags:
            Valid CA
            Trusted CA
        Object Signing Flags:
            Valid CA
            Trusted CA

Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US"
Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US"
Returned value is 0, expected result is pass
chains.sh: #10591: CRLDP: Verifying certificate(s)  EE1CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
chains.sh: Verifying certificate(s)  EE2CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der
vfychain -d AllDB -pp -vv  -g leaf -h requireFreshInfo -m crl -f    EE2CA0.der  -t Root.der
Chain is bad!
PROBLEM WITH THE CERT CHAIN:
CERT 2. Root [Certificate Authority]:
  ERROR -8180: Peer's Certificate has been revoked.
  ERROR -8180: Peer's Certificate has been revoked.
Returned value is 1, expected result is fail
chains.sh: #10592: CRLDP: Verifying certificate(s)  EE2CA0.der with flags  -g leaf -h requireFreshInfo -m crl -d AllDB -f    -t Root.der - PASSED
trying to kill httpserv with PID 13689 at Tue Nov 27 19:41:53 EST 2012
kill -USR1 13689
selfserv: normal termination
httpserv -b -p 8553 2>/dev/null;
httpserv with PID 13689 killed at Tue Nov 27 19:41:53 EST 2012
TIMESTAMP chains END: Tue Nov 27 19:41:53 EST 2012

SUMMARY:
========
NSS variables:
--------------
HOST=buildnss02
DOMSUF=usersys.redhat.com
BUILD_OPT=
USE_64=1
NSS_CYCLES=""
NSS_TESTS=""
NSS_SSL_TESTS="crl bypass_normal normal_bypass fips_normal normal_fips iopr"
NSS_SSL_RUN="cov auth stress"
NSS_AIA_PATH=
NSS_AIA_HTTP=
NSS_AIA_OCSP=
IOPR_HOSTADDR_LIST=
PKITS_DATA=/home/tinderbox/pkits/data/

Tests summary:
--------------
Passed:             10440
Failed:             152
Failed with core:   0
Unknown status:     0

END_OF_TEST<BR>
TB [2012-11-27 19:41:53] NSS - tests - 64 bits - DBG FAILED

No More Errors